SolarWinds Flaw Flagged by NATO Pen Tester

The latest platform update from SolarWinds includes patches for three vulnerabilities, including two high-severity bugs.

Dark Reading Staff, Dark Reading

June 7, 2024

1 Min Read
Software patch concept art with progress bar
Source: Zoonar GmbH via Alamy Stock Photo

SolarWinds has released its version 2024.2, including a variety of new features and upgrades, along with patches for three different security vulnerabilities.

Notably, one high-severity SWQL injection bug, tracked under CVE-2024-28996 (CVSS 7.5), was reported to SolarWinds security by Nils Putnins, a penetration tester affiliated with the North Atlantic Treaty Organization (NATO), the company reported along with the new release. The other flaws fixed in the latest SolarWinds update included a high-severity cross-site scripting flaw, tracked under CVE-2024-29004 (CVSS 7.1), and a medium-severity race condition vulnerability affecting the Web console, tracked under CVE-2024-28999 (CVSS 7.1), the company said.

In addition to security updates, the latest SolarWinds version includes improvements in its map functionality, as well as better stability, performance, and user experience.

SolarWinds tells Dark Reading there is no evidence the flaws were exploited in the wild.

SolarWinds was infamously attacked in 2020 in a successful effort by a nation-state actor to compromise many high-profile organizations, including agencies of the US federal government.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights