SolarWinds WHD vulnerabilities under attack

SCM feed for Latest
Actively Exploited

Overview

Recent reports from BleepingComputer indicate that attackers are exploiting significant vulnerabilities in SolarWinds Web Help Desk, identified as CVE-2025-40551 and CVE-2026-26399. These flaws have been under active exploitation since mid-January, allowing intruders to deploy legitimate tools for unauthorized activities within affected systems. Organizations using SolarWinds Web Help Desk could be at risk, as these vulnerabilities could facilitate broader attacks or data breaches. It is crucial for companies to assess their systems for these vulnerabilities and apply necessary updates or patches to safeguard against potential intrusions. The ongoing exploitation of these flaws underscores the need for vigilance in maintaining software security.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: SolarWinds Web Help Desk, versions affected not specified.
  • Action Required: Organizations should apply available patches for SolarWinds Web Help Desk and continuously monitor their systems for unusual activity.
  • Timeline: Ongoing since mid-January

Original Article Summary

BleepingComputer reports that intrusions leveraging the critical SolarWinds Web Help Desk flaws, tracked as CVE-2025-40551 and CVE-2026-26399, to deliver legitimate tools for illicit activity have been launched as part of a campaign believed to have commenced in mid-January.

Impact

SolarWinds Web Help Desk, versions affected not specified.

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since mid-January

Remediation

Organizations should apply available patches for SolarWinds Web Help Desk and continuously monitor their systems for unusual activity. Regularly updating software and conducting security audits can also help mitigate risks associated with these vulnerabilities.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to CVE, Critical, SolarWinds, and 1 more.

Related Coverage

China reportedly conducting critical infrastructure attack drills

SCM feed for Latest

Recent reports indicate that China is conducting drills simulating attacks on critical infrastructure in neighboring countries. These exercises utilize a system called Expedition Cloud, developed by CyberPeace, to rehearse cyber intrusions targeting essential services. The implications of these drills are significant, as they suggest a strategic focus on undermining the stability of other nations' vital systems. Such activities could lead to real-world disruptions if implemented outside of a controlled environment. The situation raises concerns about the potential for increased cyber conflicts in the region and highlights the need for nations to bolster their cybersecurity defenses.

Feb 10, 2026

Idoru, Singapore, Gambling, Smartertools, Ivanti, ZeroDayRat, Twiki, Aaran Leyland... - SWN #554

SCM feed for Latest

A recent cybersecurity incident has raised concerns involving multiple companies, including Ivanti and SmarterTools. Researchers discovered a malware strain named ZeroDayRat that targets users of certain gambling platforms in Singapore. This malware is designed to steal sensitive data, potentially impacting users' personal and financial information. The incident is particularly alarming as it highlights the risks associated with online gambling and the importance of securing personal data against such threats. Users are advised to remain vigilant and ensure their devices are protected against this evolving malware.

Feb 10, 2026

In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'

darkreading

The article discusses the threat posed by a malware known as ZeroDayRAT, which has been identified as a form of stalkerware. This malware can bypass multi-factor authentication (MFA) by gaining access to users' SIM cards, location data, and recent text messages. With this information, attackers can take over accounts or conduct targeted social engineering attacks. The implications are serious, as individuals' privacy and security can be compromised, leading to potential identity theft or harassment. Users need to be vigilant about their mobile security and consider additional protective measures to safeguard their information.

Feb 10, 2026

European Commission hit by cyberattack linked to Ivanti software flaws

SCM feed for Latest

The European Commission recently experienced a cyberattack that took advantage of two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities allowed attackers to potentially compromise sensitive information and systems within the Commission. As a key institution in the EU, any breach could have significant implications for data security and operational integrity. The exploitation of these flaws underscores the urgent need for organizations using Ivanti EPMM to assess their security measures and apply necessary updates promptly. This incident serves as a reminder of the ongoing risks associated with unpatched software vulnerabilities.

Feb 10, 2026

Compilers undermine cryptographic software security

SCM feed for Latest

Researchers have identified vulnerabilities in compilers, particularly GCC, that can compromise the security of cryptographic software. The issue arises from how these compilers optimize code, potentially undoing constant-time implementations that are designed to prevent timing attacks. Timing attacks allow attackers to infer sensitive information, like passwords, based on how long it takes a system to respond to requests. This is a significant concern for developers of cryptographic software who rely on constant-time operations to secure user data. Companies that use GCC for their software development should be aware of these vulnerabilities and consider reviewing their code to ensure it remains secure against timing analysis attacks.

Feb 10, 2026

Photo identification apps leak sensitive data of 152,000 users

SCM feed for Latest

A recent security incident has exposed sensitive data of about 152,000 users of various photo identification apps. Researchers from Cybernews discovered that the breaches were due to misconfigured Firebase instances within these applications. The lack of proper authentication and access controls left their databases vulnerable and open to unauthorized access. This incident raises significant concerns about user privacy and the safety of personal information, as such data breaches can lead to identity theft and other malicious activities. Users of these apps should be aware of the risks and take steps to secure their information.

Feb 10, 2026