Friday, May 9, 2025
HomeCVE/vulnerabilityPoC Released for SolarWinds Web Help Desk Vulnerability Exposing Passwords

PoC Released for SolarWinds Web Help Desk Vulnerability Exposing Passwords

Published on

SIEM as a Service

Follow Us on Google News

A Proof-of-Concept (PoC) has been released for a significant vulnerability discovered in SolarWinds Web Help Desk, exposing encrypted passwords and other sensitive data.

This vulnerability arises from the predictable encryption keys used in the application and the misuse of AES-GCM encryption, a widely respected cryptographic standard.

The issue highlights the importance of secure key management and proper encryption practices in software development.

- Advertisement - Google News

AES-GCM (Galois/Counter Mode) is an authenticated encryption mode that provides both confidentiality and integrity. However, it requires unique nonces (initialization vectors) for each encryption operation.

The default encryption instance used this key with mode “AES/GCM/NoPadding”.
The default encryption instance used this key with mode “AES/GCM/NoPadding”. 

If the same key and nonce are reused, an attacker can exploit this to recover the encryption keystream and decrypt other ciphertexts without knowing the key.

Vulnerability in SolarWinds Web Help Desk

As per the NetSPI report, the vulnerability affects Web Help Desk users who utilize AES-GCM encryption for securing sensitive data such as database connection passwords, LDAP query passwords, and SMTP email passwords. The issue is twofold:

  1. Predicable Encryption Keys: The encryption keys used by Web Help Desk are relatively easy to recover. The default key is embedded in the application’s source code and can be accessed by decompiling the software. Additional keys are derived from database data and source code, but these transformations offer little security due to a small key space.
  2. Reuse of Key and Nonce: The application often reuses keys and nonces across multiple encryption operations. This misuse of AES-GCM allows attackers to recover the keystream through known plaintext attacks, enabling them to decrypt any ciphertext encrypted with the same key and nonce.

Exploitation Example

In one case, a known ciphertext and plaintext pair were used to compute the keystream via XOR.

This keystream was then applied to an unknown ciphertext to retrieve its plaintext, demonstrating how easily an attacker can exploit this vulnerability.

# Simplified Python code to demonstrate keystream recovery and decryption

def xor_keystream(plaintext, ciphertext):

    keystream = bytearray()

    for p, c in zip(plaintext, ciphertext):

        keystream.append(p ^ c)

    return keystream

# Known plaintext and ciphertext pair

known_plaintext = b'\x00\x00\x00\x09Password1'

known_ciphertext = b'frcLMeS3nchpg_Ucxz-evzlfNUlfHLnpvKyjAYisVLmlEtyZ2ZFRRiVw7Kd5KQbR'

keystream = xor_keystream(known_plaintext, known_ciphertext)

# Use keystream to decrypt unknown ciphertext

unknown_ciphertext = b'your_unknown_ciphertext_here'

unknown_plaintext = bytearray()

for uc, ks in zip(unknown_ciphertext, keystream):

    unknown_plaintext.append(uc ^ ks)

print("Unknown Plaintext:", unknown_plaintext.decode('utf-8'))

Recommendations and Impact

To mitigate this vulnerability, it is crucial for users to upgrade their Web Help Desk software to the latest version.

Moreover, backup files containing sensitive data should be secured with access restricted to only necessary personnel.

The discovery of this vulnerability highlights the need for robust key management practices and adherence to encryption standards in software development.

In conclusion, the release of the PoC for the SolarWinds Web Help Desk vulnerability serves as a reminder of the importance of secure coding practices and responsible disclosure of vulnerabilities.

As software continues to play a central role in managing sensitive data, ensuring that encryption is implemented correctly will become increasingly critical to protecting user privacy and preventing data breaches.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...