đź’ˇ White Paper: Operationalizing CTEM Through External Exposure Management Get the White Paper đź’ˇ Operationalizing CTEM Through External Exposure Management
Back to Blog

SolarWinds Web Help Desk Vulnerabilities Update

Amit Sheps
Amit Sheps Head of Product Marketing

What Are Critical SolarWinds Web Help Desk Vulnerabilities

SolarWinds has disclosed multiple vulnerabilities affecting its Web Help Desk (WHD) platform, including several rated critical.

These issues allow unauthenticated attackers to bypass security controls and, in some cases, execute arbitrary code remotely. Because Web Help Desk is often deployed as an internet-facing application, these flaws can expose organizations to direct compromise if left unpatched.

The vulnerabilities fall into two main categories:

  • Authentication bypass, allowing attackers to access restricted functionality without valid credentials
  • Untrusted data deserialization, enabling remote code execution through crafted requests

SolarWinds addressed all reported issues in Web Help Desk version 2026.1.

The following CVEs are involved.

Affected CVEs

  • CVE-2025-40551
    Critical (CVSS 9.8). Untrusted data deserialization vulnerability that can lead to remote code execution without authentication.
  • CVE-2025-40552
    Critical (CVSS 9.8). Authentication bypass vulnerability that allows unauthorized access to restricted functionality.
  • CVE-2025-40553
    Critical (CVSS 9.8). Untrusted data deserialization issue that may result in arbitrary command execution.
  • CVE-2025-40554
    Critical (CVSS 9.8). Authentication bypass vulnerability that can lead to privilege escalation and system compromise.
  • CVE-2025-40536
    High severity. Security control bypass that weakens existing access enforcement mechanisms.
  • CVE-2025-40537
    High severity. Hardcoded credentials issue that could allow unauthorized access using default credentials.

What Assets Are Affected by Critical SolarWinds Web Help Desk Vulnerabilities

The vulnerabilities affect:

  • SolarWinds Web Help Desk versions 12.8.8 Hotfix 1 and earlier
  • On-prem deployments and externally accessible instances
  • Systems reachable from the internet or untrusted networks

Web Help Desk environments are particularly sensitive because they often run with elevated privileges, store internal system and user data, and sit close to core IT and service desk operations. This makes them attractive entry points for attackers.

Are Fixes Available?

Yes. SolarWinds has released patches for all identified vulnerabilities.

Organizations should:

  • Upgrade immediately to SolarWinds Web Help Desk 2026.1
  • Confirm that no older WHD instances remain active
  • Validate versions across production, staging, and backup systems

If patching cannot be completed immediately, additional steps can help reduce risk:

  • Restrict external access to Web Help Desk using firewall rules or network segmentation
  • Monitor logs for unusual requests or authentication behavior
  • Review permissions and service accounts associated with WHD
  • Identify forgotten or shadow WHD instances that may still be exposed

Given the severity and simplicity of exploitation, organizations should act with urgency.

Is CVE-2026-24858 Being Actively Exploited?

At this time, there are no confirmed reports of active exploitation related to these SolarWinds Web Help Desk vulnerabilities.

However, vulnerabilities that enable unauthenticated access or remote code execution are often quickly analyzed after disclosure. Once patches become publicly available, attackers frequently reverse-engineer them to develop proof-of-concept exploits.

Given the critical severity of these issues and the number of internet-exposed Web Help Desk deployments, organizations should assume exploitation is likely and prioritize remediation accordingly.

How Can CyCognito Help Your Organization?

Fixing vulnerabilities is only part of the challenge. The harder question is whether your organization is actually exposed.

CyCognito continuously maps your external attack surface to identify internet-exposed Web Help Desk instances and validate whether these vulnerabilities are reachable from an attacker’s point of view. This allows security teams to focus remediation efforts on real, exploitable risk rather than theoretical findings.

Following the disclosure of the SolarWinds Web Help Desk vulnerabilities, CyCognito published an Emerging Threat Advisory inside the CyCognito platform on February 4, 2026, and is actively researching enhanced detection and validation capabilities related to these issues.

To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, contact us to request a demo.



Subscribe to our newsletter

Subscribe now to get the latest insights delivered straight to your inbox.

Request a free scan

See Exactly What Attackers See

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally .

Request a Scan
Top Attack Paths