Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

0
Critical
Published: Wed Feb 04 2026 (02/04/2026, 05:50:00 UTC)
Source: The Hacker News

Description

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for remote

AI-Powered Analysis

AILast updated: 02/04/2026, 09:34:03 UTC

Technical Analysis

The vulnerability CVE-2025-40551 in SolarWinds Web Help Desk is a critical untrusted data deserialization flaw that enables remote code execution (RCE) without requiring authentication. Deserialization vulnerabilities occur when software deserializes data from untrusted sources without proper validation, allowing attackers to craft malicious payloads that execute arbitrary code on the server. In this case, the flaw allows attackers to run commands on the host machine running WHD, potentially leading to full system compromise. SolarWinds issued patches in version 2026.1, which also addressed multiple other high-severity vulnerabilities in WHD. CISA has added CVE-2025-40551 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild, although specific attack details remain undisclosed. The vulnerability's CVSS score is 9.8, reflecting its critical severity. The flaw's exploitation does not require authentication, increasing its risk profile. The vulnerability affects organizations using SolarWinds WHD, a widely deployed IT service management tool, often integrated into enterprise IT environments. The rapid addition to KEV catalog underscores the urgency for organizations to patch promptly. The vulnerability is part of a broader trend of attackers quickly weaponizing newly disclosed flaws, emphasizing the need for proactive vulnerability management. Other related vulnerabilities in Sangoma FreePBX and GitLab were also added to KEV, highlighting a surge in exploitation attempts against IT management and communication platforms. Federal agencies in the U.S. are mandated to remediate by early 2026, reflecting the criticality and urgency of the threat.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. SolarWinds WHD is commonly used in IT service management across various sectors including government, healthcare, finance, and critical infrastructure. Successful exploitation could lead to full system compromise, enabling attackers to execute arbitrary commands, deploy malware, steal sensitive data, disrupt IT operations, or pivot to other network segments. This could result in data breaches, operational downtime, and reputational damage. Given the unauthenticated nature of the exploit, attackers can target exposed WHD instances remotely without prior access, increasing the attack surface. The threat is particularly acute for organizations with internet-facing WHD deployments or insufficient network segmentation. Additionally, the timing aligns with geopolitical tensions and increased cyber espionage activities targeting European critical infrastructure and government entities, raising the likelihood of targeted attacks. The vulnerability also poses risks to managed service providers (MSPs) and third-party vendors using WHD, potentially amplifying the impact through supply chain compromise. Failure to patch promptly could lead to widespread exploitation and cascading effects across interconnected systems.

Mitigation Recommendations

European organizations should immediately verify their use of SolarWinds Web Help Desk and identify all instances, especially those exposed to external networks. They must prioritize deploying the official SolarWinds 2026.1 patch that addresses CVE-2025-40551 and related vulnerabilities. Network segmentation should be enforced to isolate WHD servers from critical assets and limit exposure. Implement strict access controls and firewall rules to restrict inbound traffic to WHD instances, ideally limiting access to trusted internal IPs or VPN users. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious deserialization payloads or anomalous command execution attempts. Conduct thorough logging and continuous monitoring of WHD server activity to detect early signs of exploitation. Organizations should also review and harden their deserialization handling practices in custom integrations or plugins. Incident response plans must be updated to include scenarios involving WHD compromise. Engage with threat intelligence feeds and CISA advisories to stay informed about emerging exploitation techniques. Finally, conduct security awareness training for IT staff to recognize and respond to exploitation attempts targeting WHD.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html","fetched":true,"fetchedAt":"2026-02-04T09:33:13.361Z","wordCount":971}

Threat ID: 6983125df9fa50a62f7d2a9d

Added to database: 2/4/2026, 9:33:17 AM

Last enriched: 2/4/2026, 9:34:03 AM

Last updated: 2/7/2026, 3:04:28 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats