Article Details
Scrape Timestamp (UTC): 2026-02-04 05:55:30.192
Source: https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
Original Article Text
Click to Toggle View
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for remote code execution. "SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine," CISA said. "This could be exploited without authentication." SolarWinds issued fixes for the flaw last week, along with CVE-2025-40536 (CVSS score: 8.1), CVE-2025-40537 (CVSS score: 7.5), CVE-2025-40552 (CVSS score: 9.8), CVE-2025-40553 (CVSS score: 9.8), and CVE-2025-40554 (CVSS score: 9.8), in WHD version 2026.1. There are currently no public reports about how the vulnerability is being weaponized in attacks, who may be the targets, or the scale of such efforts. It's the latest illustration of how quickly threat actors are moving to exploit newly disclosed flaws. Also added to the KEV catalog are three other vulnerabilities - It's worth noting that the exploitation of CVE-2021-39935 was highlighted by GreyNoise in March 2025, as part of a coordinated surge in the abuse of SSRF vulnerabilities in multiple platforms, including DotNetNuke, Zimbra Collaboration Suite, Broadcom VMware vCenter, ColumbiaSoft DocumentLocator, BerriAI LiteLLM, and Ivanti Connect Secure. Federal Civilian Executive Branch (FCEB) agencies are required to fix CVE-2025-40551 by February 6, 2026, and the rest by February 24, 2026, pursuant to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical SolarWinds Web Help Desk vulnerability to its Known Exploited Vulnerabilities catalog, indicating active exploitation.
Tracked as CVE-2025-40551, this flaw involves untrusted data deserialization, potentially allowing remote code execution with a CVSS score of 9.8.
SolarWinds has issued patches for this and several other vulnerabilities in WHD version 2026.1, addressing critical security concerns.
Federal agencies must remediate CVE-2025-40551 by February 6, 2026, under Binding Operational Directive 22-01, to mitigate significant risks.
While no public reports detail the exploitation methods or targets, the rapid exploitation of newly disclosed vulnerabilities remains a critical challenge.
The KEV catalog also includes vulnerabilities like CVE-2021-39935, previously noted for widespread abuse in various platforms, emphasizing the need for timely patching.
This situation underscores the importance of proactive vulnerability management and swift response to emerging threats in cybersecurity practices.