Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

Posted on September 23, 2025September 23, 2025 By CWS

SolarWinds has launched an pressing safety advisory for a essential vulnerability in its Internet Assist Desk software program that might enable an unauthenticated attacker to realize distant code execution (RCE).

The flaw, tracked as CVE-2025-26399, carries a essential severity score of 9.8 out of 10, highlighting the extreme danger it poses to affected programs. The vulnerability stems from the deserialization of untrusted knowledge inside the AjaxProxy part of the software program.

In response to the advisory, the vulnerability permits a distant attacker to execute arbitrary instructions on the host machine with no need any credentials.

This problem is especially regarding as it’s a patch bypass for 2 beforehand addressed vulnerabilities, CVE-2024-28988 and CVE-2024-28986.

This recurrence suggests a persistent weak point within the software program’s dealing with of serialized knowledge, permitting safety researchers to search out new methods to take advantage of the identical underlying drawback.

SolarWinds has credited an nameless researcher working with Pattern Micro’s Zero Day Initiative for locating and responsibly disclosing this newest iteration of the flaw.

Mitigations

In response to the invention, SolarWinds has issued Internet Assist Desk 12.8.7 Hotfix 1. The corporate strongly urges all clients who’ve downloaded and put in model 12.8.7 to use this hotfix instantly to mitigate the chance of exploitation.

The patch addresses the vulnerability by modifying a number of core recordsdata, together with whd-core.jar, whd-web.jar, and whd-persistence.jar, and including the HikariCP.jar file.

Directors are instructed to cease the Internet Assist Desk service, again up and exchange the desired recordsdata, after which restart the service to finish the set up.

Failure to use the hotfix leaves programs uncovered to potential takeover by distant attackers.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Desk, Enables, RCE, SolarWinds, Unauthenticated, Vulnerability, Web

Post navigation

Previous Post: All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
Next Post: Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Related Posts

Meta to Cease Instagram E2EE Messaging by 2026 Meta to Cease Instagram E2EE Messaging by 2026 Cyber Security News
Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Cyber Security News
15 Best Docker Monitoring Tools in 2025 15 Best Docker Monitoring Tools in 2025 Cyber Security News
Microsoft Confirms New Outlook Bug Blocking Excel Attachments Microsoft Confirms New Outlook Bug Blocking Excel Attachments Cyber Security News
Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Cyber Security News
Akira Ransomware Targets Over 250 Organizations, Extracts  Million in Ransom Payments – New CISA Report Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark