Articles tagged "SolarWinds"

Found 9 articles

Actively Exploited

Recent reports from BleepingComputer indicate that attackers are exploiting significant vulnerabilities in SolarWinds Web Help Desk, identified as CVE-2025-40551 and CVE-2026-26399. These flaws have been under active exploitation since mid-January, allowing intruders to deploy legitimate tools for unauthorized activities within affected systems. Organizations using SolarWinds Web Help Desk could be at risk, as these vulnerabilities could facilitate broader attacks or data breaches. It is crucial for companies to assess their systems for these vulnerabilities and apply necessary updates or patches to safeguard against potential intrusions. The ongoing exploitation of these flaws underscores the need for vigilance in maintaining software security.

Impact: SolarWinds Web Help Desk, versions affected not specified.
Remediation: Organizations should apply available patches for SolarWinds Web Help Desk and continuously monitor their systems for unusual activity. Regularly updating software and conducting security audits can also help mitigate risks associated with these vulnerabilities.
Read Original

Hackers are exploiting vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to systems. This allows them to execute code on affected machines, deploying legitimate forensic tools like Velociraptor to maintain persistence and enable remote control. Organizations using SolarWinds WHD should be particularly vigilant, as these vulnerabilities can lead to serious security breaches. The situation underscores the need for companies to regularly update and patch their systems to protect against such attacks. Users of the software must act quickly to ensure their environments are secure.

Impact: SolarWinds Web Help Desk (WHD)
Remediation: Organizations should patch SolarWinds WHD to the latest version and implement security best practices to mitigate exposure.
Read Original

In December 2025, vulnerabilities in SolarWinds Web Help Desk instances were exploited, allowing attackers to gain initial access to compromised systems. This incident raises concerns for organizations using SolarWinds products, as it indicates that these flaws may have been leveraged as zero-day exploits. Such vulnerabilities can lead to unauthorized access and potential data breaches, making it crucial for affected companies to address these security gaps promptly. Users should be vigilant and monitor their systems for unusual activity while applying any available patches or updates. The incident serves as a reminder of the ongoing risks associated with third-party software vulnerabilities.

Impact: SolarWinds Web Help Desk instances
Remediation: Organizations should apply any available patches or updates from SolarWinds and monitor their systems for unauthorized access.
Read Original

Huntress has reported an ongoing attack exploiting vulnerabilities in SolarWinds Web Help Desk software. Attackers are targeting unpatched versions of this tool to execute remote code, which allows them to install Zoho ManageEngine software for persistent access and Velociraptor for control over compromised systems. This incident was confirmed on February 7, 2026, and it raises significant concerns for organizations that rely on SolarWinds products, as it highlights the risks associated with unaddressed software vulnerabilities. Companies using this software should prioritize patching to safeguard against these exploits and prevent unauthorized access to their systems.

Impact: SolarWinds Web Help Desk, Zoho ManageEngine, Velociraptor
Remediation: Organizations should update to the latest patched versions of SolarWinds Web Help Desk to mitigate these vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in SolarWinds Web Help Desk that is currently being exploited in active attacks. This flaw poses a risk to federal agencies, which have been instructed to apply necessary patches within three days to mitigate potential damage. The urgency of the situation underscores the importance of maintaining up-to-date systems, especially for organizations that rely on SolarWinds products. If left unaddressed, this vulnerability could lead to unauthorized access and compromise sensitive data, affecting not just government agencies but potentially their partners and clients as well. The situation is a reminder for all users of SolarWinds software to remain vigilant and ensure their systems are secure.

Impact: SolarWinds Web Help Desk
Remediation: Federal agencies are required to patch their systems within three days. Specific patch numbers or versions are not mentioned.
Read Original

SolarWinds has addressed four critical vulnerabilities found in their Web Help Desk software that could allow attackers to execute code remotely or bypass authentication. These flaws can be exploited without requiring any user credentials, posing a serious risk to organizations using the software. Companies that rely on Web Help Desk should prioritize applying the latest patches to protect their systems from potential attacks. The vulnerabilities were disclosed recently, making immediate action essential to prevent exploitation. Users and administrators are urged to check for updates and ensure their installations are secure.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest patches provided by SolarWinds for Web Help Desk.
Read Original

SolarWinds has issued important security updates to address two serious vulnerabilities in its Web Help Desk software. The flaws include an authentication bypass that could allow unauthorized access and a remote command execution (RCE) vulnerability, which could enable attackers to run commands on affected systems. These issues affect users of the Web Help Desk, which is widely used in IT support environments. Organizations relying on this software need to act quickly, as these vulnerabilities could lead to significant security breaches if exploited. Users are advised to apply the updates provided by SolarWinds to mitigate these risks.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest security updates released by SolarWinds to patch the vulnerabilities.
Read Original

The U.S. Office of Management and Budget (OMB) has rolled back a requirement put in place during the Biden administration that mandated federal contractors to complete a standardized self-attestation form regarding their software security practices. This requirement was introduced following the SolarWinds hack, which exposed significant vulnerabilities in federal systems. The reversal could impact the security oversight of government contractors, as the self-attestation was intended to ensure that these firms were implementing appropriate security measures. Without this requirement, there are concerns that the federal government may be less equipped to safeguard its systems against potential cyber threats. The decision raises questions about the future of cybersecurity standards for contractors working with government agencies.

Impact: Federal government contractors
Remediation: N/A
Read Original

The SEC has dropped its lawsuit against SolarWinds and its CISO Timothy G. Brown, which accused the company of misleading investors regarding its security practices related to the 2020 supply chain attack. This decision marks the end of a lengthy scrutiny period, raising questions about accountability in cybersecurity practices within major firms.

Impact: N/A
Remediation: N/A
Read Original