Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

Posted on September 23, 2025September 23, 2025 By CWS

SolarWinds has launched an pressing safety advisory for a essential vulnerability in its Internet Assist Desk software program that might enable an unauthenticated attacker to realize distant code execution (RCE).

The flaw, tracked as CVE-2025-26399, carries a essential severity score of 9.8 out of 10, highlighting the extreme danger it poses to affected programs. The vulnerability stems from the deserialization of untrusted knowledge inside the AjaxProxy part of the software program.

In response to the advisory, the vulnerability permits a distant attacker to execute arbitrary instructions on the host machine with no need any credentials.

This problem is especially regarding as it’s a patch bypass for 2 beforehand addressed vulnerabilities, CVE-2024-28988 and CVE-2024-28986.

This recurrence suggests a persistent weak point within the software program’s dealing with of serialized knowledge, permitting safety researchers to search out new methods to take advantage of the identical underlying drawback.

SolarWinds has credited an nameless researcher working with Pattern Micro’s Zero Day Initiative for locating and responsibly disclosing this newest iteration of the flaw.

Mitigations

In response to the invention, SolarWinds has issued Internet Assist Desk 12.8.7 Hotfix 1. The corporate strongly urges all clients who’ve downloaded and put in model 12.8.7 to use this hotfix instantly to mitigate the chance of exploitation.

The patch addresses the vulnerability by modifying a number of core recordsdata, together with whd-core.jar, whd-web.jar, and whd-persistence.jar, and including the HikariCP.jar file.

Directors are instructed to cease the Internet Assist Desk service, again up and exchange the desired recordsdata, after which restart the service to finish the set up.

Failure to use the hotfix leaves programs uncovered to potential takeover by distant attackers.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Desk, Enables, RCE, SolarWinds, Unauthenticated, Vulnerability, Web

Post navigation

Previous Post: All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
Next Post: Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Related Posts

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations Cyber Security News
Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network Cyber Security News
New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device Cyber Security News
5 Asian Cities Where Cybersecurity Maturity Meets Innovation Cyber Security News
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries
  • Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware
  • SolarWinds Makes Third Attempt at Patching Exploited Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries
  • Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware
  • SolarWinds Makes Third Attempt at Patching Exploited Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News