Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Posted on February 9, 2026 By CWS

Recent cyberattacks have targeted internet-accessible SolarWinds Web Help Desk (WHD) systems, exploiting newly patched vulnerabilities, according to insights from Microsoft. These attacks, which took place in December 2025, demonstrated a multi-stage intrusion strategy, with hackers leveraging these vulnerabilities to execute PowerShell and deploy additional payloads.

Vulnerability Exploitation Details

Microsoft has indicated that the compromised WHD systems were susceptible to several vulnerabilities, particularly CVE-2025-40551 and CVE-2025-40536, which were patched in January 2026. Additionally, these systems were also vulnerable to CVE-2025-26399, a flaw addressed in September 2025. However, the specific vulnerability utilized by the attackers remains unconfirmed.

CVE-2025-26399 is identified as a remote code execution bug stemming from unauthenticated AjaxProxy deserialization. This issue was revealed as a bypass for a previous vulnerability, CVE-2024-28988. Notably, the AjaxProxy flaw is also central to CVE-2025-40551, which involves deserialization of untrusted data, leading to unauthorized remote code execution.

Attackers’ Techniques and Persistence

The attackers demonstrated sophisticated techniques to maintain persistent access. They deployed the legitimate remote monitoring tool ManageEngine, establishing reverse SSH and RDP connections. Additionally, they utilized a scheduled task to initiate a QEMU virtual machine with system privileges at startup, aiding in evasion and SSH access through port forwarding.

Further tactics included DLL sideloading to access LSASS memory for credential theft and executing DCSync attacks to request password data from domain controllers. These methods highlight the attackers’ reliance on legitimate administrative tools and low-profile persistence mechanisms.

Security Recommendations and Outlook

Microsoft advises organizations to promptly patch their WHD systems against these vulnerabilities, eliminate unauthorized remote monitoring applications, update credentials, and isolate compromised hosts. The pattern of exploiting exposed applications underscores the critical need for robust patch management and monitoring practices.

This incident illustrates a common yet impactful threat pattern, where a single exposed application can lead to full domain compromise if vulnerabilities are left unaddressed. Organizations are urged to be vigilant and proactive in their cybersecurity measures to mitigate such risks in the future.

Security Week News Tags:AjaxProxy, CVE, Cybersecurity, ManageEngine, Microsoft, patch management, RCE, SolarWinds, Vulnerabilities, zero-day

Post navigation

Previous Post: Spear-Phishing Campaign Targets Uzbekistan and Russia
Next Post: Microsoft Exchange Online Misidentifies Emails as Phishing

Related Posts

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Security Week News
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking Security Week News
OpenAI to Help DoD With Cyber Defense Under New 0 Million Contract OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract Security Week News
Arch Linux Project Responding to Week-Long DDoS Attack Arch Linux Project Responding to Week-Long DDoS Attack Security Week News
ShadowV2 DDoS Service Lets Customers Self-Manage Attacks ShadowV2 DDoS Service Lets Customers Self-Manage Attacks Security Week News
263,000 Impacted by Esse Health Data Breach 263,000 Impacted by Esse Health Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News