Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. SolarWinds Web Help Desk RCE Vulnerability Added to CISA KEV
SolarWinds Web Help Desk RCE Vulnerability Added to CISA KEV

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICAL

SolarWinds Web Help Desk RCE Vulnerability Added to CISA KEV

Critical deserialization vulnerability in SolarWinds Web Help Desk enables unauthenticated remote code execution. CISA confirms active exploitation.

Dylan H.

Security Team

February 5, 2026
2 min read

Affected Products

  • SolarWinds Web Help Desk

Overview

CISA has added CVE-2025-40551, a critical deserialization vulnerability in SolarWinds Web Help Desk, to its Known Exploited Vulnerabilities (KEV) Catalog. This vulnerability allows unauthenticated attackers to execute arbitrary code on affected systems.

"The vulnerability contains a deserialization of untrusted data vulnerability that could lead to remote code execution, allowing an attacker to run commands on the host machine." — CISA Advisory


Vulnerability Details

AttributeValue
CVE IDCVE-2025-40551
VendorSolarWinds
ProductWeb Help Desk
Vulnerability TypeDeserialization of Untrusted Data
CVSS Score9.8 (Critical)
AuthenticationNone Required
CISA Due DateFebruary 26, 2026

Technical Analysis

Attack Vector

The vulnerability exists in how Web Help Desk processes serialized Java objects:

  1. No Authentication Required - Attackers can exploit without valid credentials
  2. Remote Exploitation - Attack can be launched over the network
  3. Full System Compromise - Successful exploitation grants command execution

Exploitation in the Wild

Security researchers have observed:

  • Targeted attacks against IT service management infrastructure
  • Deployment of web shells for persistent access
  • Lateral movement to connected systems
  • Data exfiltration from helpdesk ticket databases

Affected Versions

VersionStatus
Web Help Desk < 12.8.5Vulnerable
Web Help Desk 12.8.5+Patched

Immediate Actions

1. Check Your Version

# Check SolarWinds Web Help Desk version via API
$response = Invoke-WebRequest -Uri "https://your-whd-server/helpdesk/WebObjects/Helpdesk.woa/wa/VersionAction/version"
$response.Content

2. Apply Patches Immediately

# Download and apply the latest hotfix from SolarWinds Customer Portal
# Ensure you have Web Help Desk 12.8.5 or later installed

3. Network Segmentation

If immediate patching is not possible:

# Block external access to Web Help Desk
# Restrict access to internal trusted networks only
iptables -A INPUT -p tcp --dport 8443 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 8443 -j DROP

4. Monitor for Indicators of Compromise

Look for:

  • Unexpected processes spawned by the WHD service
  • Unusual outbound network connections
  • New or modified files in WHD directories
  • Authentication anomalies in logs

Detection Rules

Sigma Rule

title: SolarWinds Web Help Desk Exploitation Attempt
status: experimental
logsource:
    category: webserver
detection:
    selection:
        cs-uri-stem|contains:
            - '/helpdesk/WebObjects/'
            - '/Helpdesk.woa/'
        cs-method: 'POST'
    condition: selection
level: high

Snort Rule

alert tcp any any -> any 8443 (msg:"Potential SolarWinds WHD Exploitation";
content:"POST"; http_method;
content:"/helpdesk/WebObjects/"; http_uri;
classtype:attempted-admin; sid:1000001; rev:1;)

Timeline

DateEvent
January 2026Vulnerability discovered
January 28, 2026SolarWinds releases patch
February 3, 2026CISA adds to KEV
February 5, 2026Active exploitation confirmed
February 26, 2026FCEB remediation deadline

References

  • CISA KEV Catalog Entry
  • SolarWinds Security Advisory
  • NVD CVE-2025-40551

Related Articles

  • CISA Adds Four Critical Vulnerabilities to KEV Catalog
  • Critical n8n Vulnerability CVE-2026-21858
#SolarWinds#RCE#CISA KEV#Deserialization#Critical

Related Articles

CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

A critical remote code execution vulnerability (CVSS 9.1) in Wazuh versions 4.0.0–4.14.2 allows an attacker with access to a worker node to achieve root...

6 min read

CVE-2025-68613: n8n Remote Code Execution via Improper

CISA adds CVE-2025-68613 to the Known Exploited Vulnerabilities catalog — a CVSS 9.9 flaw in n8n's workflow expression evaluation system that enables...

5 min read

BeyondTrust Remote Support Pre-Authentication RCE Under

A critical pre-authentication OS command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access with CVSS 9.9 is being...

3 min read
Back to all Security Alerts