Skip to main content
Mallory

CISA Flags Actively Exploited SolarWinds Web Help Desk Flaw as Metasploit Adds Exploit Modules

actively-exploited-vulnerabilitygovernment-vulnerability-catalogproof-of-concept-releaseinternet-facing-service-vulnerabilityrapid-weaponization
Updated March 21, 2026 at 02:32 PM4 sources
Share:
CISA Flags Actively Exploited SolarWinds Web Help Desk Flaw as Metasploit Adds Exploit Modules

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

CISA added multiple vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including a critical SolarWinds Web Help Desk (WHD) security protection bypass tracked as CVE-2025-40536 (CVSS 9.8). The issue stems from flawed CSRF-check logic that relies on a whitelist of query parameters, which can be bypassed with crafted URI parameters to reach restricted functionality without authentication; SolarWinds patched the flaw in WHD 2026.1. CISA set an accelerated remediation deadline for U.S. Federal Civilian Executive Branch agencies, and Microsoft separately reported an active campaign targeting SolarWinds WHD but did not confirm whether CVE-2025-40536 was the specific vulnerability exploited.

Rapid7 reported that Metasploit added exploit module support for SolarWinds WHD vulnerabilities CVE-2025-40536 and CVE-2025-40551, enabling post-exploitation sessions running as NT AUTHORITY\SYSTEM when successful. This increases operational risk for unpatched environments by lowering the barrier to exploitation and reinforces the urgency of applying SolarWinds’ available fixes and validating exposure of WHD instances, particularly those reachable from untrusted networks.

Timeline

  1. Feb 13, 2026

    CISA sets federal remediation deadlines for newly listed KEV flaws

    Under Binding Operational Directive 22-01, CISA required FCEB agencies to remediate the newly added vulnerabilities by set deadlines: February 15, 2026 for CVE-2025-40536 and March 5, 2026 for the other three flaws.

  2. Feb 13, 2026

    CISA adds four actively exploited flaws to the KEV catalog

    CISA added CVE-2024-43468, CVE-2025-15556, CVE-2025-40536, and CVE-2026-20700 to its Known Exploited Vulnerabilities catalog, signaling active exploitation affecting Microsoft Configuration Manager, Notepad++, SolarWinds Web Help Desk, and Apple devices.

  3. Feb 13, 2026

    Rapid7 releases Metasploit module for SolarWinds Web Help Desk flaws

    Rapid7 published a Metasploit Framework update that included a new exploit module for SolarWinds Web Help Desk vulnerabilities CVE-2025-40536 and CVE-2025-40551, capable of yielding a session running as NT AUTHORITY\SYSTEM.

  4. Feb 13, 2026

    Google TAG reports Apple zero-day to Apple

    Google's Threat Analysis Group discovered and reported CVE-2026-20700 to Apple, indicating the flaw was identified during investigation of targeted exploitation that may be associated with nation-state or commercial spyware activity.

  5. Feb 13, 2026

    Apple ships updates for actively exploited zero-day CVE-2026-20700

    Apple released security updates across iOS, iPadOS, macOS, watchOS, tvOS, and visionOS to fix CVE-2026-20700, a dyld memory corruption and buffer overflow issue allowing arbitrary code execution. Apple said the flaw had been exploited in an extremely sophisticated targeted attack.

  6. Feb 13, 2026

    SolarWinds patches Web Help Desk authentication bypass flaw

    SolarWinds fixed CVE-2025-40536, a critical Web Help Desk security control bypass that can let attackers access restricted functions without authentication, in Web Help Desk version 2026.1.

  7. Feb 13, 2026

    Microsoft releases fix for Configuration Manager SQL injection flaw

    Microsoft provided update KB29166583 to address CVE-2024-43468, a critical SQL injection vulnerability in Microsoft Configuration Manager that can be exploited unauthenticated against an internet-exposed endpoint and potentially escalated to remote code execution.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

CISA Orders Patching of Exploited SolarWinds Web Help Desk RCE (CVE-2025-40551)

CISA Orders Patching of Exploited SolarWinds Web Help Desk RCE (CVE-2025-40551)

The U.S. Cybersecurity and Infrastructure Security Agency (**CISA**) added **CVE-2025-40551**—a critical (CVSS 9.8) *SolarWinds Web Help Desk (WHD)* vulnerability—to its **Known Exploited Vulnerabilities (KEV)** catalog after confirming active exploitation. The flaw is described as **deserialization of untrusted data** that can enable **unauthenticated remote code execution**, potentially allowing full compromise of affected WHD servers; the issue was reported to SolarWinds by Horizon3.ai researcher **Jimi Sebree**. CISA also issued a directive requiring U.S. federal civilian agencies to patch CVE-2025-40551 by the stated deadline, and SolarWinds released a fix in *Web Help Desk* version **2026.1**. Reporting tied the bug to a prior WHD issue (**CVE-2024-28986**) and characterized CVE-2025-40551 as part of a sequence of vulnerabilities involving bypasses of earlier fixes; CISA’s KEV update also included additional exploited flaws in **Sangoma FreePBX** (including **CVE-2019-19006** and **CVE-2025-64328**) and **GitLab** (**CVE-2021-39935**, SSRF), expanding the set of vulnerabilities agencies must remediate under KEV timelines.

1 months ago
CISA Flags Actively Exploited Vulnerabilities in SolarWinds Web Help Desk and Major Platforms

CISA Flags Actively Exploited Vulnerabilities in SolarWinds Web Help Desk and Major Platforms

**CISA added multiple vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog**, triggering mandatory remediation timelines for U.S. federal civilian agencies. The newly listed issues include an actively exploited flaw in **SolarWinds Web Help Desk** (`CVE-2025-40536`) with an accelerated patch deadline, alongside additional KEV additions affecting **Apple** platforms (iOS, macOS, tvOS, watchOS, visionOS), **Microsoft** products, and **Notepad++**. Apple stated it was aware of reports the issue “may have been exploited in an extremely sophisticated attack against specific targeted individuals,” with **Google Threat Analysis Group** credited with discovery, underscoring continued targeting of high-value users via mobile/endpoint zero-days. Separate reporting highlighted the broader operational context driving these directives: **Microsoft’s February security update** addressed **59 vulnerabilities**, including **six zero-days under active exploitation**, reinforcing that exploit timelines are compressing and patching is increasingly a “defense sprint.” In parallel, CISA also moved to reduce systemic exposure at the perimeter by ordering agencies to **remove unsupported network edge devices** (e.g., firewalls/routers) within a year, reflecting concern that end-of-support infrastructure and rapidly weaponized vulnerabilities are converging into a persistent, high-impact federal risk.

1 months ago
Critical RCE and Authentication Bypass Vulnerabilities in SolarWinds Web Help Desk

Critical RCE and Authentication Bypass Vulnerabilities in SolarWinds Web Help Desk

SolarWinds released security updates for *Web Help Desk (WHD)* to address multiple critical vulnerabilities that could allow **unauthenticated remote attackers** to bypass authentication and achieve **remote code execution (RCE)**. The patched issues include two critical authentication bypass flaws, **CVE-2025-40552** and **CVE-2025-40554** (reported by watchTowr researcher Piotr Bazydlo), and two critical RCE flaws tied to **untrusted data deserialization**, **CVE-2025-40553** (Bazydlo) and **CVE-2025-40551** (reported by Horizon3.ai researcher Jimi Sebree), enabling remote command execution without prior access. SolarWinds also fixed a high-severity **hardcoded credentials** issue, **CVE-2025-40537**, which could enable unauthorized access to administrative functions under certain conditions. The vendor advised administrators to upgrade to **Web Help Desk 2026.1** and patch quickly, noting WHD has a history of being targeted and previously had vulnerabilities flagged as actively exploited by CISA, reinforcing the likelihood of rapid attacker interest following disclosure and patch availability.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.