Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

SolarWinds Web Help Desk Exploitation: A Multi-Stage Attack on Exposed Servers



SolarWinds Web Help Desk exploitation: A multi-stage attack on exposed servers. According to Microsoft, attackers have been exploiting CVE-2025-40551, a security control bypass vulnerability, to achieve unauthenticated remote code execution and run arbitrary commands within the WHD application context. The vulnerabilities were discovered by Microsoft's Defender Security Research Team and highlight a critical vulnerability in publicly exposed IT management software instances.

  • SolarWinds Web Help Desk instances were exploited for remote code execution (RCE) through publicly exposed web help desk instances.
  • Microsoft's Defender Security Research Team discovered the vulnerability, which can lead to the compromise of an entire domain.
  • The attackers exploited a security control bypass vulnerability (CVE-2025-40551) and used legitimate administrative tools for persistence.
  • The attackers conducted DCSync attacks, enumerated sensitive domain users and groups, and created scheduled tasks to maintain persistence.
  • Mitigation strategies include keeping instances up-to-date, removing unauthorized RMM tools, rotating service and admin accounts, and isolating compromised machines.



  • SolarWinds, a leading provider of IT management software, has been exploited by threat actors for remote code execution (RCE) through its publicly exposed web help desk instances. The vulnerability, discovered by Microsoft's Defender Security Research Team, is described as a multi-stage attack that can lead to the compromise of an entire domain. In this article, we will delve into the details of the SolarWinds Web Help Desk exploitation and explore the implications for organizations with exposed servers.

    According to Microsoft, the attackers initially exploited CVE-2025-40551, a security control bypass vulnerability, which could allow an unauthenticated attacker to gain access to restricted functionality. The researchers discovered that successful exploitation of this vulnerability enabled attackers to achieve unauthenticated RCE within the WHD application context. This was followed by the use of legitimate administrative tools and low-noise persistence mechanisms to maintain persistence on infected systems.

    The attackers then conducted a DCSync attack, where they simulated a Domain Controller (DC) request for password hashes and sensitive information from an Active Directory (AD) database. In one case, Microsoft observed that the threat actors enumerated sensitive domain users and groups, including Domain Admins, establishing persistence via reverse SSH and RDP access.

    The attackers also attempted to create a scheduled task to launch a QEMU virtual machine under the SYSTEM account at system startup to cover up their tracks within a virtualized environment while exposing SSH access via port forwarding. Furthermore, they used DLL side-loading on some hosts by utilizing "wab.exe," a legitimate system executable associated with the Windows Address Book, to launch a rogue DLL ("sspicli.dll") and dump the contents of LSASS memory for credential theft.

    To mitigate this attack, Microsoft advises users to keep the SolarWinds Web Help Desk instances up-to-date, find and remove any unauthorized RMM tools, rotate service and admin accounts, and isolate compromised machines to limit the breach. The company emphasizes the importance of defense in depth, timely patching of internet-facing services, and behavior-based detection across identity, endpoint, and network layers.

    The SolarWinds Web Help Desk exploitation highlights a critical vulnerability in publicly exposed IT management software instances. Organizations with exposed servers must ensure that they follow Microsoft's recommendations to minimize the risk of similar attacks. In this article, we have explored the details of the SolarWinds Web Help Desk exploitation and provided guidance on how organizations can protect themselves against such threats.

    In conclusion, the SolarWinds Web Help Desk exploitation is a significant threat to organizations with exposed servers. The attackers' use of living-off-the-land techniques and legitimate administrative tools underscores the importance of defense in depth and timely patching of internet-facing services. By understanding the vulnerabilities exploited in this attack and implementing the recommended mitigation strategies, organizations can minimize their risk of falling victim to similar attacks.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/SolarWinds-Web-Help-Desk-Exploitation-A-Multi-Stage-Attack-on-Exposed-Servers-ehn.shtml

  • https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html

  • https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-40551

  • https://www.cvedetails.com/cve/CVE-2025-40551/


  • Published: Mon Feb 9 12:40:09 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us