Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Posted on February 9, 2026 By CWS

Recent cyberattacks have targeted internet-accessible SolarWinds Web Help Desk (WHD) systems, exploiting newly patched vulnerabilities, according to insights from Microsoft. These attacks, which took place in December 2025, demonstrated a multi-stage intrusion strategy, with hackers leveraging these vulnerabilities to execute PowerShell and deploy additional payloads.

Vulnerability Exploitation Details

Microsoft has indicated that the compromised WHD systems were susceptible to several vulnerabilities, particularly CVE-2025-40551 and CVE-2025-40536, which were patched in January 2026. Additionally, these systems were also vulnerable to CVE-2025-26399, a flaw addressed in September 2025. However, the specific vulnerability utilized by the attackers remains unconfirmed.

CVE-2025-26399 is identified as a remote code execution bug stemming from unauthenticated AjaxProxy deserialization. This issue was revealed as a bypass for a previous vulnerability, CVE-2024-28988. Notably, the AjaxProxy flaw is also central to CVE-2025-40551, which involves deserialization of untrusted data, leading to unauthorized remote code execution.

Attackers’ Techniques and Persistence

The attackers demonstrated sophisticated techniques to maintain persistent access. They deployed the legitimate remote monitoring tool ManageEngine, establishing reverse SSH and RDP connections. Additionally, they utilized a scheduled task to initiate a QEMU virtual machine with system privileges at startup, aiding in evasion and SSH access through port forwarding.

Further tactics included DLL sideloading to access LSASS memory for credential theft and executing DCSync attacks to request password data from domain controllers. These methods highlight the attackers’ reliance on legitimate administrative tools and low-profile persistence mechanisms.

Security Recommendations and Outlook

Microsoft advises organizations to promptly patch their WHD systems against these vulnerabilities, eliminate unauthorized remote monitoring applications, update credentials, and isolate compromised hosts. The pattern of exploiting exposed applications underscores the critical need for robust patch management and monitoring practices.

This incident illustrates a common yet impactful threat pattern, where a single exposed application can lead to full domain compromise if vulnerabilities are left unaddressed. Organizations are urged to be vigilant and proactive in their cybersecurity measures to mitigate such risks in the future.

Security Week News Tags:AjaxProxy, CVE, Cybersecurity, ManageEngine, Microsoft, patch management, RCE, SolarWinds, Vulnerabilities, zero-day

Post navigation

Previous Post: Spear-Phishing Campaign Targets Uzbekistan and Russia
Next Post: Microsoft Exchange Online Misidentifies Emails as Phishing

Related Posts

The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
Furl Raises  Million for Autonomous Vulnerability Remediation Furl Raises $10 Million for Autonomous Vulnerability Remediation Security Week News
Is AI Use in the Workplace Out of Control? Is AI Use in the Workplace Out of Control? Security Week News
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch Security Week News
Ransomware Groups May Shift Back to Encryption Strategies Ransomware Groups May Shift Back to Encryption Strategies Security Week News
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark