Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Posted on February 9, 2026 By CWS

Recent cyberattacks have targeted internet-accessible SolarWinds Web Help Desk (WHD) systems, exploiting newly patched vulnerabilities, according to insights from Microsoft. These attacks, which took place in December 2025, demonstrated a multi-stage intrusion strategy, with hackers leveraging these vulnerabilities to execute PowerShell and deploy additional payloads.

Vulnerability Exploitation Details

Microsoft has indicated that the compromised WHD systems were susceptible to several vulnerabilities, particularly CVE-2025-40551 and CVE-2025-40536, which were patched in January 2026. Additionally, these systems were also vulnerable to CVE-2025-26399, a flaw addressed in September 2025. However, the specific vulnerability utilized by the attackers remains unconfirmed.

CVE-2025-26399 is identified as a remote code execution bug stemming from unauthenticated AjaxProxy deserialization. This issue was revealed as a bypass for a previous vulnerability, CVE-2024-28988. Notably, the AjaxProxy flaw is also central to CVE-2025-40551, which involves deserialization of untrusted data, leading to unauthorized remote code execution.

Attackers’ Techniques and Persistence

The attackers demonstrated sophisticated techniques to maintain persistent access. They deployed the legitimate remote monitoring tool ManageEngine, establishing reverse SSH and RDP connections. Additionally, they utilized a scheduled task to initiate a QEMU virtual machine with system privileges at startup, aiding in evasion and SSH access through port forwarding.

Further tactics included DLL sideloading to access LSASS memory for credential theft and executing DCSync attacks to request password data from domain controllers. These methods highlight the attackers’ reliance on legitimate administrative tools and low-profile persistence mechanisms.

Security Recommendations and Outlook

Microsoft advises organizations to promptly patch their WHD systems against these vulnerabilities, eliminate unauthorized remote monitoring applications, update credentials, and isolate compromised hosts. The pattern of exploiting exposed applications underscores the critical need for robust patch management and monitoring practices.

This incident illustrates a common yet impactful threat pattern, where a single exposed application can lead to full domain compromise if vulnerabilities are left unaddressed. Organizations are urged to be vigilant and proactive in their cybersecurity measures to mitigate such risks in the future.

Security Week News Tags:AjaxProxy, CVE, Cybersecurity, ManageEngine, Microsoft, patch management, RCE, SolarWinds, Vulnerabilities, zero-day

Post navigation

Previous Post: Spear-Phishing Campaign Targets Uzbekistan and Russia
Next Post: Microsoft Exchange Online Misidentifies Emails as Phishing

Related Posts

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News
750,000 Impacted by Data Breach at Canadian Investment Watchdog 750,000 Impacted by Data Breach at Canadian Investment Watchdog Security Week News
Gambit Cyber Raises .4 Million in Seed Funding Gambit Cyber Raises $3.4 Million in Seed Funding Security Week News
Personal Information Compromised in Freedom Mobile Data Breach Personal Information Compromised in Freedom Mobile Data Breach Security Week News
Threat Actors Use SVG Smuggling for Browser-Native Redirection Threat Actors Use SVG Smuggling for Browser-Native Redirection Security Week News
European Commission Probes Cyberattack on IT Systems European Commission Probes Cyberattack on IT Systems Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies
  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies
  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark