Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

Posted on January 29, 2026January 29, 2026 By CWS

Ravie LakshmananJan 29, 2026Vulnerability / Software program Safety

SolarWinds has launched safety updates to handle a number of safety vulnerabilities impacting SolarWinds Internet Assist Desk, together with 4 vital vulnerabilities that might end in authentication bypass and distant code execution (RCE).
The checklist of vulnerabilities is as follows –

CVE-2025-40536 (CVSS rating: 8.1) – A safety management bypass vulnerability that might permit an unauthenticated attacker to realize entry to sure restricted performance
CVE-2025-40537 (CVSS rating: 7.5) – A tough-coded credentials vulnerability that might permit entry to administrative capabilities utilizing the “shopper” person account
CVE-2025-40551 (CVSS rating: 9.8) – An untrusted knowledge deserialization vulnerability that might result in distant code execution, which might permit an unauthenticated attacker to run instructions on the host machine
CVE-2025-40552 (CVSS rating: 9.8) – An authentication bypass vulnerability that might permit an unauthenticated attacker to execute actions and strategies
CVE-2025-40553 (CVSS rating: 9.8) – An untrusted knowledge deserialization vulnerability that might result in distant code execution, which might permit an unauthenticated attacker to run instructions on the host machine
CVE-2025-40554 (CVSS rating: 9.8) – An authentication bypass vulnerability that might permit an attacker to invoke particular actions inside Internet Assist Desk

Whereas Jimi Sebree from Horizon3.ai has been credited with discovering and reporting the primary three vulnerabilities, watchTowr’s Piotr Bazydlo has been acknowledged for the remaining three flaws. All the problems have been addressed in WHD 2026.1.

“Each CVE-2025-40551 and CVE-2025-40553 are vital deserialization of untrusted knowledge vulnerabilities that permit a distant unauthenticated attacker to realize RCE on a goal system and execute payloads comparable to arbitrary OS command execution,” Rapid7 mentioned.

“RCE through deserialization is a extremely dependable vector for attackers to leverage, and as these vulnerabilities are exploitable with out authentication, the impression of both of those two vulnerabilities is critical.”
Whereas CVE-2025-40552 and CVE-2025-40554 have been described as authentication bypasses, they may be leveraged to acquire RCE and obtain the identical impression as the opposite two RCE deserialization vulnerabilities, the cybersecurity firm added.
In recent times, SolarWinds has launched fixes to resolve a number of flaws in its Internet Assist Desk software program, together with CVE-2024-28986, CVE-2024-28987, CVE-2024-28988, and CVE-2025-26399. It is value noting that CVE-2025-26399 addresses a patch bypass for CVE-2024-28988, which, in flip, is a patch bypass of CVE-2024-28986.
In late 2024, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added CVE-2024-28986 and CVE-2024-28987 to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.

In a put up explaining CVE-2025-40551, Horizon3.ai’s Sebree described it as one more deserialization vulnerability stemming from the AjaxProxy performance that might end in distant code execution. To attain RCE, an attacker wants to hold out the next sequence of actions –

Set up a sound session and extract key values
Create a LoginPref element
Set the state of the LoginPref element to permit us to entry the file add
Use the JSONRPC bridge to create some malicious Java objects behind the scenes
Set off these malicious Java objects

With flaws in Internet Assist Desk having been weaponized prior to now, it is important that prospects transfer rapidly to replace to the most recent model of the assistance desk and IT service administration platform.

The Hacker News Tags:Auth, Bypass, Critical, Desk, Fixes, Flaws, RCE, SolarWinds, Unauthenticated, Web

Post navigation

Previous Post: Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants
Next Post: eScan Antivirus Update Server Hacked to Push Malicious Update packages

Related Posts

Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor The Hacker News
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark