Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Patches Critical Web Help Desk Vulnerabilities

SolarWinds Patches Critical Web Help Desk Vulnerabilities

Posted on January 29, 2026January 29, 2026 By CWS

SolarWinds on Wednesday introduced patches for six vulnerabilities within the Internet Assist Desk product, together with 4 critical-severity bugs.

First in line is CVE-2025-40551 (CVSS rating of 9.8), a essential flaw described as an untrusted information deserialization situation that would result in distant code execution (RCE) with out authentication.

In accordance with Horizon3.ai, which found and reported the defect, CVE-2025-40551 exists in AjaxProxy performance, the place requests destined for different features are improperly sanitized, and a blocklist operate might be bypassed by together with allowed phrases early in a JSON payload.

The tactic, Horizon3.ai explains, has been used within the exploitation of CVE-2024-28986 and subsequent bypasses (tracked as CVE-2024-28988 and CVE-2025-26399), which had been additionally rooted within the AjaxProxy performance.

The remaining three essential vulnerabilities, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554 (CVSS rating of 9.8), had been found and reported by WatchTowr.

CVE-2025-40553 is one other untrusted information deserialization flaw that would result in unauthenticated RCE, however no technical particulars have been launched.Commercial. Scroll to proceed studying.

CVE-2025-40552 and CVE-2025-40554 are described as authentication bypass defects that would permit distant attackers to execute or invoke particular actions or strategies. The essential severity of the problems means that each might be exploited for RCE, Rapid7 notes.

The remaining two Internet Assist Desk points addressed on Wednesday are high-severity vulnerabilities: a safety management bypass situation (CVE-2025-40536) and a hardcoded credentials bug (CVE-2025-40537). Each had been found by Horizon3.ai.

CVE-2025-40536, the cybersecurity agency explains, exists as a result of a operate that verifies CSRF tokens and validates request question parameters might be bypassed through bogus URI parameters to entry sure restricted performance.

Profitable exploitation of the difficulty permits an attacker to efficiently create a sound AjaxProxy occasion, which may then be abused to set off CVE-2025-40551 and obtain RCE, Horizon3.ai says.

CVE-2025-40537, the corporate notes, exists as a result of, upon initialization, Internet Assist Desk creates a shopper account with the default username and password of ‘shopper’, for demo functions.

“Whereas this account seems to be restricted in its entry rights in some manufacturing environments, we’ve come throughout instances the place this account remains to be related to the default tech account and permits anybody logging in with this ‘shopper’ consumer account to change to the administrator account,” Horizon3.ai explains.

All six vulnerabilities have been addressed with the discharge of Internet Assist Desk model 2026.1. Though none of those bugs has been flagged as exploited within the wild, organizations are suggested to replace their cases as quickly as potential.

Associated: Fortinet Patches Exploited FortiCloud SSO Authentication Bypass

Associated: Excessive-Severity Distant Code Execution Vulnerability Patched in OpenSSL

Associated: Microsoft Patches Workplace Zero-Day Seemingly Exploited in Focused Assaults

Associated: Atlassian, GitLab, Zoom Launch Safety Patches

Security Week News Tags:Critical, Desk, Patches, SolarWinds, Vulnerabilities, Web

Post navigation

Previous Post: Google Disrupted World’s Largest IPIDEA Residential Proxy Network
Next Post: CISA Warns of FortiCloud SSO Authentication Bypass Vulnerability Exploited in Attacks

Related Posts

Apono Raises  Million for Cloud Identity Management Platform Apono Raises $34 Million for Cloud Identity Management Platform Security Week News
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak Security Week News
Keycard Emerges From Stealth Mode With  Million in Funding Keycard Emerges From Stealth Mode With $38 Million in Funding Security Week News
Ransomware Group Claims Attack on Beer Giant Asahi Ransomware Group Claims Attack on Beer Giant Asahi Security Week News
Hirundo Raises  Million to Eliminate AI’s Bad Behavior Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News