Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Posted on February 9, 2026 By CWS

Recent cyberattacks have targeted internet-accessible SolarWinds Web Help Desk (WHD) systems, exploiting newly patched vulnerabilities, according to insights from Microsoft. These attacks, which took place in December 2025, demonstrated a multi-stage intrusion strategy, with hackers leveraging these vulnerabilities to execute PowerShell and deploy additional payloads.

Vulnerability Exploitation Details

Microsoft has indicated that the compromised WHD systems were susceptible to several vulnerabilities, particularly CVE-2025-40551 and CVE-2025-40536, which were patched in January 2026. Additionally, these systems were also vulnerable to CVE-2025-26399, a flaw addressed in September 2025. However, the specific vulnerability utilized by the attackers remains unconfirmed.

CVE-2025-26399 is identified as a remote code execution bug stemming from unauthenticated AjaxProxy deserialization. This issue was revealed as a bypass for a previous vulnerability, CVE-2024-28988. Notably, the AjaxProxy flaw is also central to CVE-2025-40551, which involves deserialization of untrusted data, leading to unauthorized remote code execution.

Attackers’ Techniques and Persistence

The attackers demonstrated sophisticated techniques to maintain persistent access. They deployed the legitimate remote monitoring tool ManageEngine, establishing reverse SSH and RDP connections. Additionally, they utilized a scheduled task to initiate a QEMU virtual machine with system privileges at startup, aiding in evasion and SSH access through port forwarding.

Further tactics included DLL sideloading to access LSASS memory for credential theft and executing DCSync attacks to request password data from domain controllers. These methods highlight the attackers’ reliance on legitimate administrative tools and low-profile persistence mechanisms.

Security Recommendations and Outlook

Microsoft advises organizations to promptly patch their WHD systems against these vulnerabilities, eliminate unauthorized remote monitoring applications, update credentials, and isolate compromised hosts. The pattern of exploiting exposed applications underscores the critical need for robust patch management and monitoring practices.

This incident illustrates a common yet impactful threat pattern, where a single exposed application can lead to full domain compromise if vulnerabilities are left unaddressed. Organizations are urged to be vigilant and proactive in their cybersecurity measures to mitigate such risks in the future.

Security Week News Tags:AjaxProxy, CVE, Cybersecurity, ManageEngine, Microsoft, patch management, RCE, SolarWinds, Vulnerabilities, zero-day

Post navigation

Previous Post: Spear-Phishing Campaign Targets Uzbekistan and Russia
Next Post: Microsoft Exchange Online Misidentifies Emails as Phishing

Related Posts

Private Sector Vital in Cybersecurity Battle Private Sector Vital in Cybersecurity Battle Security Week News
Chinese Cyberspies Hacked US Defense Contractors Chinese Cyberspies Hacked US Defense Contractors Security Week News
Oasis Security Secures 0M for Identity Management Innovation Oasis Security Secures $120M for Identity Management Innovation Security Week News
Webinar Today: Fact vs. Fiction – The Truth About API Security Webinar Today: Fact vs. Fiction – The Truth About API Security Security Week News
White House Scraps ‘Burdensome’ Software Security Rules  White House Scraps ‘Burdensome’ Software Security Rules  Security Week News
Madhu Gottumukkala Officially Appointed CISA Deputy Director Madhu Gottumukkala Officially Appointed CISA Deputy Director Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark