Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Home/CyberSecurity News/SolarWinds Help Desk RCE Vulnerabilities Exposed Online
CyberSecurity News

SolarWinds Help Desk RCE Vulnerabilities Exposed Online

A critical remote code execution (RCE) flaw continues to impact over 170 SolarWinds Web Help Desk installations. Already actively exploited in the wild, the vulnerability was recently added to CISA’s...

Sarah simpson
Sarah simpson
February 5, 2026 2 Min Read
6 0

A critical remote code execution (RCE) flaw continues to impact over 170 SolarWinds Web Help Desk installations. Already actively exploited in the wild, the vulnerability was recently added to CISA’s Known Exploited Vulnerabilities catalog.

The vulnerability, tracked as CVE-2025-40551, carries a CVSS score of 9.8 and allows unauthenticated attackers to execute arbitrary commands on affected systems through untrusted data deserialization.

The Shadowserver Foundation has been tracking and reporting vulnerable SolarWinds Help Desk installations through its Vulnerable HTTP reports, identifying approximately 170 exposed instances based on version checks. These publicly accessible installations represent critical targets for threat actors, as the vulnerability requires no authentication and can be exploited remotely over the network.

CVE-2025-40551 is an insecure deserialization vulnerability affecting SolarWinds Web Help Desk versions prior to 2026.1. The flaw exists in the AjaxProxy functionality and enables attackers to send specially crafted serialized Java objects to the application, which, when processed, execute arbitrary commands on the underlying host machine.

For the last few days, we have been sharing SolarWinds Help Desk CVE-2025-40551 RCE vulnerable IPs (version check based) – ~170 seen. This vuln is now on @CISACyber KEV. Data in Vulnerable HTTP reports: https://t.co/qxv0Gv5ELc

Dashboard Tree Map view: https://t.co/zzg4wFSQVr pic.twitter.com/2Pa6CYymKF

— The Shadowserver Foundation (@Shadowserver) February 5, 2026

Researchers at Horizon3.ai discovered the vulnerability alongside several related security issues, including static credentials and security protection bypasses.

The vulnerability is particularly dangerous because it allows complete system compromise without any user interaction or prior authentication. Successful exploitation grants attackers full control over the confidentiality, integrity, and availability of the affected system, enabling them to execute commands with the privileges of the Web Help Desk service account.

CISA KEV Addition and Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency added CVE-2025-40551 to its Known Exploited Vulnerabilities catalog on February 3, 2026, confirming active exploitation in the wild.

Under Binding Operational Directive 22-01, federal civilian executive branch agencies must remediate this vulnerability by February 6, 2026. The KEV designation signals elevated risk beyond federal environments and indicates that attackers are actively targeting this vulnerability.

BitSight assigned the vulnerability a Dynamic Vulnerability Exploit (DVE) score of 9.19, reflecting extreme technical severity with credible exploitation likelihood. The company noted that attackers continue to prioritize IT management and service desk platforms due to their privileged access, central operational role, and ability to facilitate follow-on compromise.

SolarWinds released version 2026.1 to address CVE-2025-40551 along with three related vulnerabilities: CVE-2025-40552 (authentication bypass), CVE-2025-40553 (deserialization RCE), and CVE-2025-40554 (authentication bypass).

All four vulnerabilities carry critical CVSS scores of 9.8 and enable various forms of unauthenticated access and code execution.

Organizations operating affected versions should apply the vendor-provided updates immediately, as the widespread use of SolarWinds Web Help Desk and confirmed active exploitation make these installations prime targets for threat actors.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Betterment Data Breach Exposes 1.4 Million Customer

Next Post

CentOS 9 Vulnerability: Attacker Escal Lets Attackers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us