Multiple Critical Vulnerabilities in SolarWinds Web Help Desk
Summary
Hide ▲
Show ▼
SolarWinds has released security updates to address multiple critical vulnerabilities in SolarWinds Web Help Desk, including CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. These vulnerabilities could result in authentication bypass and remote code execution (RCE). CVE-2025-40551 is actively exploited in attacks and has been added to CISA's KEV catalog. SolarWinds Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions. SolarWinds has previously released a third patch to address a critical deserialization vulnerability (CVE-2025-26399) in Web Help Desk 12.8.7 and earlier versions. This flaw allows unauthenticated remote code execution (RCE) on affected systems. The vulnerability was discovered by an anonymous researcher and reported through Trend Micro's Zero Day Initiative (ZDI). The flaw is a patch bypass for CVE-2024-28988, which itself was a bypass for CVE-2024-28986. The original vulnerability was exploited in the wild and added to the KEV catalog by CISA. SolarWinds advises users to update to version 12.8.7 HF1 to mitigate the risk. SolarWinds Web Help Desk is a help desk and ticketing suite used by medium-to-large organizations for IT support request tracking, workflow automation, asset management, and compliance assurance. The vulnerability affects the AjaxProxy component, and the hotfix requires replacing specific JAR files. Microsoft has revealed that it observed a multi-stage intrusion that involved the threat actors exploiting internet-exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. The attackers used legitimate components associated with Zoho ManageEngine to enable persistent remote control over the infected system. They enumerated sensitive domain users and groups, established persistence via reverse SSH and RDP access, and conducted a DCSync attack to request password hashes and other sensitive information from an Active Directory (AD) database. Threat actors have been exploiting CVE-2025-40551 and CVE-2025-26399 to deploy legitimate tools for malicious purposes, such as Zoho ManageEngine and Velociraptor. The attackers targeted at least three organizations and leveraged Cloudflare tunnels for persistence. The malicious activity was spotted by researchers at Huntress Security and is believed to be part of a campaign that started on January 16. The attackers used Velociraptor for command and control (C2) and Zoho ManageEngine for remote monitoring and management. The attackers installed the Zoho ManageEngine Assist agent via an MSI file fetched from the Catbox file-hosting platform and configured the tool for unattended access. They registered the compromised host to a Zoho Assist account tied to an anonymous Proton Mail address. The attackers used Velociraptor as a command-and-control (C2) framework that communicates with attackers via Cloudflare Workers. The attackers used an outdated version of Velociraptor (0.73.4), which is vulnerable to a privilege escalation flaw. The attackers installed Cloudflared from Cloudflare's official GitHub repository as a secondary tunnel-based access channel for C2 redundancy. The attackers disabled Windows Defender and Firewall via registry modifications to ensure that fetching additional payloads would not be blocked. The attackers downloaded a fresh copy of the VS Code binary approximately a second after disabling Defender. System administrators are recommended to upgrade SolarWinds Web Help Desk to version 2026.1 or later, remove public internet access to SolarWinds WHD admin interfaces, and reset all credentials associated with the product.
Timeline
-
09.02.2026 16:42 2 articles · 8h ago
Microsoft details multi-stage attacks exploiting SolarWinds Web Help Desk
Threat actors have been exploiting CVE-2025-40551 and CVE-2025-26399 to deploy legitimate tools for malicious purposes, such as Zoho ManageEngine and Velociraptor. The attackers targeted at least three organizations and leveraged Cloudflare tunnels for persistence. The malicious activity was spotted by researchers at Huntress Security and is believed to be part of a campaign that started on January 16. The attackers used Velociraptor for command and control (C2) and Zoho ManageEngine for remote monitoring and management. The attackers installed the Zoho ManageEngine Assist agent via an MSI file fetched from the Catbox file-hosting platform and configured the tool for unattended access. They registered the compromised host to a Zoho Assist account tied to an anonymous Proton Mail address. The attackers used Velociraptor as a command-and-control (C2) framework that communicates with attackers via Cloudflare Workers. The attackers used an outdated version of Velociraptor (0.73.4), which is vulnerable to a privilege escalation flaw. The attackers installed Cloudflared from Cloudflare's official GitHub repository as a secondary tunnel-based access channel for C2 redundancy. The attackers disabled Windows Defender and Firewall via registry modifications to ensure that fetching additional payloads would not be blocked. The attackers downloaded a fresh copy of the VS Code binary approximately a second after disabling Defender. System administrators are recommended to upgrade SolarWinds Web Help Desk to version 2026.1 or later, remove public internet access to SolarWinds WHD admin interfaces, and reset all credentials associated with the product.
Show sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
29.01.2026 11:00 6 articles · 11d ago
SolarWinds releases updates for four critical Web Help Desk flaws
Threat actors have been exploiting CVE-2025-40551 and CVE-2025-26399 to deploy legitimate tools for malicious purposes, such as Zoho ManageEngine and Velociraptor. The attackers targeted at least three organizations and leveraged Cloudflare tunnels for persistence. The malicious activity was spotted by researchers at Huntress Security and is believed to be part of a campaign that started on January 16. The attackers used Velociraptor for command and control (C2) and Zoho ManageEngine for remote monitoring and management. The attackers installed the Zoho ManageEngine Assist agent via an MSI file fetched from the Catbox file-hosting platform and configured the tool for unattended access. They registered the compromised host to a Zoho Assist account tied to an anonymous Proton Mail address. The attackers used Velociraptor as a command-and-control (C2) framework that communicates with attackers via Cloudflare Workers. The attackers used an outdated version of Velociraptor (0.73.4), which is vulnerable to a privilege escalation flaw. The attackers installed Cloudflared from Cloudflare's official GitHub repository as a secondary tunnel-based access channel for C2 redundancy. The attackers disabled Windows Defender and Firewall via registry modifications to ensure that fetching additional payloads would not be blocked. The attackers downloaded a fresh copy of the VS Code binary approximately a second after disabling Defender. System administrators are recommended to upgrade SolarWinds Web Help Desk to version 2026.1 or later, remove public internet access to SolarWinds WHD admin interfaces, and reset all credentials associated with the product.
Show sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
23.09.2025 15:46 3 articles · 4mo ago
SolarWinds releases hotfix for critical deserialization vulnerability in Web Help Desk
The vulnerability is the third attempt to address the original flaw CVE-2024-28986. SolarWinds Web Help Desk is used by medium-to-large organizations for IT support request tracking, workflow automation, asset management, and compliance assurance. The vulnerability affects the AjaxProxy component and is caused by unsafe deserialization handling. The hotfix requires installing Web Help Desk version 12.8.7 and replacing specific JAR files.
Show sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
Information Snippets
-
CVE-2025-26399 is a critical deserialization vulnerability in SolarWinds Web Help Desk.
First reported: 23.09.2025 15:463 sources, 5 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The flaw allows unauthenticated remote code execution on affected systems.
First reported: 23.09.2025 15:463 sources, 5 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The vulnerability affects SolarWinds Web Help Desk 12.8.7 and all previous versions.
First reported: 23.09.2025 15:463 sources, 6 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The flaw was discovered by an anonymous researcher and reported through Trend Micro's Zero Day Initiative (ZDI).
First reported: 23.09.2025 15:463 sources, 5 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-26399 is a patch bypass for CVE-2024-28988, which itself was a bypass for CVE-2024-28986.
First reported: 23.09.2025 15:463 sources, 6 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The original vulnerability (CVE-2024-28986) was exploited in the wild and added to the KEV catalog by CISA.
First reported: 23.09.2025 15:463 sources, 5 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
SolarWinds advises users to update to version 12.8.7 HF1 to mitigate the risk.
First reported: 23.09.2025 15:463 sources, 6 articlesShow sources
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — thehackernews.com — 23.09.2025 15:46
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CVE-2025-26399 is the third attempt to address the original flaw CVE-2024-28986.
First reported: 23.09.2025 16:413 sources, 4 articlesShow sources
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
SolarWinds Web Help Desk is used by medium-to-large organizations for IT support request tracking, workflow automation, asset management, and compliance assurance.
First reported: 23.09.2025 16:413 sources, 4 articlesShow sources
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The vulnerability is caused by unsafe deserialization handling in the AjaxProxy component.
First reported: 23.09.2025 16:413 sources, 5 articlesShow sources
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The hotfix requires installing Web Help Desk version 12.8.7 and replacing specific JAR files.
First reported: 23.09.2025 16:413 sources, 3 articlesShow sources
- SolarWinds releases third patch to fix Web Help Desk RCE bug — www.bleepingcomputer.com — 23.09.2025 16:41
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40536 is a security control bypass vulnerability with a CVSS score of 8.1.
First reported: 29.01.2026 11:003 sources, 4 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40537 is a hard-coded credentials vulnerability with a CVSS score of 7.5.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CVE-2025-40551 is an untrusted data deserialization vulnerability with a CVSS score of 9.8.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40552 is an authentication bypass vulnerability with a CVSS score of 9.8.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CVE-2025-40553 is an untrusted data deserialization vulnerability with a CVSS score of 9.8.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CVE-2025-40554 is an authentication bypass vulnerability with a CVSS score of 9.8.
First reported: 29.01.2026 11:003 sources, 4 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
Jimi Sebree from Horizon3.ai discovered and reported CVE-2025-40536, CVE-2025-40537, and CVE-2025-40551.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
Piotr Bazydlo from watchTowr discovered and reported CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554.
First reported: 29.01.2026 11:003 sources, 3 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
All vulnerabilities have been addressed in WHD 2026.1.
First reported: 29.01.2026 11:002 sources, 3 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
-
CVE-2025-40551 and CVE-2025-40553 allow remote unauthenticated attackers to achieve RCE on a target system.
First reported: 29.01.2026 11:003 sources, 5 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CVE-2025-40552 and CVE-2025-40554 can be leveraged to obtain RCE and achieve the same impact as the other two RCE deserialization vulnerabilities.
First reported: 29.01.2026 11:003 sources, 4 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40551 stems from the AjaxProxy functionality and could result in remote code execution.
First reported: 29.01.2026 11:003 sources, 4 articlesShow sources
- SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass — thehackernews.com — 29.01.2026 11:00
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40551 is actively exploited in attacks.
First reported: 03.02.2026 21:373 sources, 5 articlesShow sources
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CISA added CVE-2025-40551 to its catalog of flaws exploited in the wild.
First reported: 03.02.2026 21:373 sources, 5 articlesShow sources
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CISA ordered federal agencies to patch their systems within three days.
First reported: 03.02.2026 21:373 sources, 5 articlesShow sources
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
CISA encouraged all network defenders to patch their devices against ongoing CVE-2025-40551 attacks.
First reported: 03.02.2026 21:373 sources, 5 articlesShow sources
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions.
First reported: 03.02.2026 21:373 sources, 3 articlesShow sources
- CISA flags critical SolarWinds RCE flaw as exploited in attacks — www.bleepingcomputer.com — 03.02.2026 21:37
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CISA added CVE-2025-40551 to its KEV catalog on February 4, 2026.
First reported: 04.02.2026 07:502 sources, 3 articlesShow sources
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
Federal agencies are required to patch CVE-2025-40551 by February 6, 2026.
First reported: 04.02.2026 07:502 sources, 3 articlesShow sources
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
There are no public reports about how CVE-2025-40551 is being weaponized in attacks.
First reported: 04.02.2026 07:502 sources, 3 articlesShow sources
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40551 is the latest example of threat actors quickly exploiting newly disclosed flaws.
First reported: 04.02.2026 07:502 sources, 3 articlesShow sources
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog — thehackernews.com — 04.02.2026 07:50
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40551 allows unauthenticated adversaries to gain admin-level access to help-desk systems in low complexity attacks.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40551 is described as a deserialization of untrusted data vulnerability that could lead to remote code execution.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40553 is a deserialization of untrusted data RCE vulnerability.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40552 is an authentication bypass vulnerability that could allow an attacker to execute actions and methods that should be protected by authentication.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
CVE-2025-40554 is an authentication bypass vulnerability that could allow an attacker to invoke specific actions within Web Help Desk.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
Attackers could chain CVE-2025-40552 or CVE-2025-40554 with CVE-2025-40551 or CVE-2025-40553 to gain complete control of targeted systems for lateral movement, data theft and ransomware.
First reported: 04.02.2026 12:152 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Vulnerability Actively Exploited — www.infosecurity-magazine.com — 04.02.2026 12:15
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
Microsoft observed a multi-stage intrusion involving the exploitation of internet-exposed SolarWinds Web Help Desk (WHD) instances.
First reported: 09.02.2026 16:422 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers used legitimate components associated with Zoho ManageEngine to enable persistent remote control over the infected system.
First reported: 09.02.2026 16:422 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers enumerated sensitive domain users and groups, including Domain Admins.
First reported: 09.02.2026 16:422 sources, 2 articlesShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers established persistence via reverse SSH and RDP access.
First reported: 09.02.2026 16:421 source, 1 articleShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The attackers attempted to create a scheduled task to launch a QEMU virtual machine under the SYSTEM account at system startup.
First reported: 09.02.2026 16:421 source, 1 articleShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
The attackers used DLL side-loading on some hosts by using "wab.exe" to launch a rogue DLL to dump the contents of LSASS memory and conduct credential theft.
First reported: 09.02.2026 16:421 source, 1 articleShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
In at least one case, the attackers conducted a DCSync attack to request password hashes and other sensitive information from an Active Directory (AD) database.
First reported: 09.02.2026 16:421 source, 1 articleShow sources
- SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers — thehackernews.com — 09.02.2026 16:42
-
Threat actors exploited CVE-2025-40551 and CVE-2025-26399 to deploy legitimate tools for malicious purposes.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers targeted at least three organizations and leveraged Cloudflare tunnels for persistence.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers used Velociraptor for command and control (C2) and Zoho ManageEngine for remote monitoring and management.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The malicious activity was spotted by researchers at Huntress Security and is believed to be part of a campaign that started on January 16.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers installed the Zoho ManageEngine Assist agent via an MSI file fetched from the Catbox file-hosting platform.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers configured the tool for unattended access and registered the compromised host to a Zoho Assist account tied to an anonymous Proton Mail address.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers used Velociraptor as a command-and-control (C2) framework that communicates with attackers via Cloudflare Workers.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers used an outdated version of Velociraptor (0.73.4), which is vulnerable to a privilege escalation flaw.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers installed Cloudflared from Cloudflare's official GitHub repository as a secondary tunnel-based access channel for C2 redundancy.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers disabled Windows Defender and Firewall via registry modifications to ensure that fetching additional payloads would not be blocked.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
The attackers downloaded a fresh copy of the VS Code binary approximately a second after disabling Defender.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
System administrators are recommended to upgrade SolarWinds Web Help Desk to version 2026.1 or later.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
System administrators are recommended to remove public internet access to SolarWinds WHD admin interfaces.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
-
System administrators are recommended to reset all credentials associated with the product.
First reported: 09.02.2026 22:281 source, 1 articleShow sources
- Threat actors exploit SolarWinds WDH flaws to deploy Velociraptor — www.bleepingcomputer.com — 09.02.2026 22:28
Similar Happenings
Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support and PRA
BeyondTrust has patched a critical pre-authentication remote code execution (RCE) vulnerability (CVE-2026-1731, CVSS 9.9) in Remote Support (RS) and Privileged Remote Access (PRA) products. The flaw could allow unauthenticated attackers to execute OS commands in the context of the site user, leading to unauthorized access, data exfiltration, and service disruption. The vulnerability affects RS versions 25.3.1 and prior, and PRA versions 24.3.4 and prior. Patches are available in RS versions 25.3.2 and later, and PRA versions 25.1.1 and later. Self-hosted customers must manually apply updates if not subscribed to automatic updates. The vulnerability was discovered on January 31, 2026, with approximately 11,000 exposed instances identified, including around 8,500 on-prem deployments. BeyondTrust secured all RS/PRA cloud systems by February 2, 2026. The flaw was discovered by Harsh Jaiswal and the Hacktron AI team. Threat actors can exploit the flaw through maliciously crafted client requests in low-complexity attacks that do not require user interaction. In June 2025, BeyondTrust fixed a high-severity RS/PRA Server-Side Template Injection vulnerability.
Critical Authentication Bypass and RCE Flaws in SolarWinds Web Help Desk
SolarWinds has released patches for critical vulnerabilities in its Web Help Desk software, including authentication bypass and remote code execution (RCE) flaws. The vulnerabilities, reported by security researchers, can be exploited by unauthenticated attackers in low-complexity attacks. The company advises immediate patching due to the high risk of exploitation.
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
Three vulnerabilities in the mcp-server-git, maintained by Anthropic, allow file access, deletion, and code execution via prompt injection. The flaws have been addressed in versions 2025.9.25 and 2025.12.18. The vulnerabilities include path traversal and argument injection issues that can be exploited to manipulate Git repositories and execute arbitrary code. The issues were disclosed by Cyata researcher Yarden Porat, highlighting the risks of prompt injection attacks without direct system access. The vulnerabilities affect all versions of mcp-server-git released before December 8, 2025, and apply to default installations. An attacker only needs to influence what an AI assistant reads to trigger the vulnerabilities. The flaws allow attackers to execute code, delete arbitrary files, and load arbitrary files into a large language model's context. While the vulnerabilities do not directly exfiltrate data, sensitive files may still be exposed to the AI, creating downstream security and privacy risks. The vulnerabilities have been assigned CVE-2025-68143, CVE-2025-68144, and CVE-2025-68145.
Critical RCE Flaw in Trend Micro Apex Central On-Prem Windows
Trend Micro has addressed critical vulnerabilities in on-premise Windows versions of Apex Central, including a remote code execution (RCE) flaw (CVE-2025-69258) with a CVSS score of 9.8. The flaw allows unauthenticated remote attackers to execute arbitrary code under SYSTEM context. Two additional flaws (CVE-2025-69259, CVE-2025-69260) with CVSS scores of 7.5 each can cause denial-of-service conditions. The vulnerabilities affect versions below Build 7190 and require physical or remote access to exploit. Apex Central is a web-based management console that helps admins manage multiple Trend Micro products and services, including antivirus, content security, and threat detection. Trend Micro has released Critical Patch Build 7190 to address these vulnerabilities.
CISA Adds Actively Exploited Microsoft Office and HPE OneView Vulnerabilities to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities affecting Microsoft Office and HPE OneView to its Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation. The vulnerabilities include CVE-2009-0556 in Microsoft Office PowerPoint and CVE-2025-37164 in HPE OneView. The flaws allow for remote code execution and memory corruption. CISA urges federal agencies to apply patches by January 28, 2026, to mitigate risks. A proof-of-concept (PoC) exploit for CVE-2025-37164 has been publicly released, increasing the risk of exploitation.