Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

Posted on September 23, 2025September 23, 2025 By CWS

SolarWinds has launched an pressing safety advisory for a essential vulnerability in its Internet Assist Desk software program that might enable an unauthenticated attacker to realize distant code execution (RCE).

The flaw, tracked as CVE-2025-26399, carries a essential severity score of 9.8 out of 10, highlighting the extreme danger it poses to affected programs. The vulnerability stems from the deserialization of untrusted knowledge inside the AjaxProxy part of the software program.

In response to the advisory, the vulnerability permits a distant attacker to execute arbitrary instructions on the host machine with no need any credentials.

This problem is especially regarding as it’s a patch bypass for 2 beforehand addressed vulnerabilities, CVE-2024-28988 and CVE-2024-28986.

This recurrence suggests a persistent weak point within the software program’s dealing with of serialized knowledge, permitting safety researchers to search out new methods to take advantage of the identical underlying drawback.

SolarWinds has credited an nameless researcher working with Pattern Micro’s Zero Day Initiative for locating and responsibly disclosing this newest iteration of the flaw.

Mitigations

In response to the invention, SolarWinds has issued Internet Assist Desk 12.8.7 Hotfix 1. The corporate strongly urges all clients who’ve downloaded and put in model 12.8.7 to use this hotfix instantly to mitigate the chance of exploitation.

The patch addresses the vulnerability by modifying a number of core recordsdata, together with whd-core.jar, whd-web.jar, and whd-persistence.jar, and including the HikariCP.jar file.

Directors are instructed to cease the Internet Assist Desk service, again up and exchange the desired recordsdata, after which restart the service to finish the set up.

Failure to use the hotfix leaves programs uncovered to potential takeover by distant attackers.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Desk, Enables, RCE, SolarWinds, Unauthenticated, Vulnerability, Web

Post navigation

Previous Post: All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
Next Post: Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Related Posts

OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News
APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data Cyber Security News
5 Immediate Steps to be Followed After Clicking on a Malicious Link Cyber Security News
Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide Cyber Security News
Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Cyber Security News
Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark