CISA Adds Actively Exploited SolarWinds RCE Flaw to KEV Catalog

CISA KEV Catalog Updated with Actively Exploited SolarWinds Web Help Desk RCE Flaw (CVE-2025-40551)

CRITICAL
February 5, 2026
February 11, 2026
4m read
VulnerabilityPatch ManagementRegulatory

Related Entities(initial)

Organizations

Products & Tech

SolarWinds Web Help Desk (WHD)

CVE Identifiers

CVE-2025-40551
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive concerning a critical vulnerability in SolarWinds Web Help Desk (WHD). The vulnerability, CVE-2025-40551, is a deserialization of untrusted data flaw that allows for remote code execution (RCE) and has been assigned a CVSS score of 9.8. CISA has added this flaw to its Known Exploited Vulnerabilities (KEV) catalog, which confirms that there is reliable evidence of active, in-the-wild exploitation by threat actors. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to remediate this vulnerability by February 6, 2026. This action serves as an urgent call to all public and private sector organizations using SolarWinds WHD to patch their systems immediately to prevent compromise.


Vulnerability Details

CVE-2025-40551 is a critical vulnerability stemming from the insecure deserialization of untrusted data within the SolarWinds Web Help Desk platform. Deserialization is the process of reconstructing a data structure or object from a byte stream. If an application deserializes untrusted data without proper validation, an attacker can manipulate the serialized object to inject malicious code. When the application processes this malicious object, it can lead to arbitrary code execution with the permissions of the application, which in this case could be high.

  • CVSS Score: 9.8 (Critical)
  • Attack Vector: Remote
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None

This combination of factors makes the vulnerability extremely dangerous, as it can be exploited by an unauthenticated attacker over the network without any user involvement.

Affected Systems

  • SolarWinds Web Help Desk (WHD) - specific affected versions should be confirmed via the SolarWinds advisory, but organizations should assume they are vulnerable if not running the latest patched version.

Exploitation Status

The vulnerability is under active exploitation. CISA's addition of CVE-2025-40551 to the KEV catalog is the official confirmation of this status. Threat actors are actively scanning for and exploiting vulnerable WHD instances. The ease of exploitation and the high impact (RCE) make this an attractive target for a wide range of actors, from cybercriminals seeking to deploy ransomware to state-sponsored groups aiming for espionage.

Impact Assessment

A successful exploit of CVE-2025-40551 would grant an attacker remote code execution capabilities on the underlying server hosting the Web Help Desk software. This would allow the attacker to:

  • Gain a persistent foothold within the victim's network.
  • Steal sensitive data from the help desk system and connected databases.
  • Use the compromised server as a pivot point for lateral movement to other systems.
  • Deploy ransomware or other destructive malware.

Given that help desk systems often integrate with other critical IT infrastructure like Active Directory, the potential for a catastrophic breach is high.

Detection Methods

  1. Log Analysis: Monitor web server logs for the WHD instance for unusual or malformed requests, particularly those involving serialized Java objects. This aligns with D3-NTA: Network Traffic Analysis.
  2. Process Monitoring: Use an EDR solution to monitor the WHD process for the spawning of unexpected child processes, such as cmd.exe, powershell.exe, or sh. This is a key part of D3-PA: Process Analysis.
  3. Vulnerability Scanning: Actively scan your external and internal networks for instances of SolarWinds WHD and verify they are patched against CVE-2025-40551.

Remediation Steps

CRITICAL: Immediate patching is required due to active exploitation.

  1. Apply Patches: Prioritize the immediate application of the security patches provided by SolarWinds. This is the only way to fully remediate the vulnerability. This is a direct application of D3-SU: Software Update.
  2. Restrict Access: If patching cannot be done immediately, restrict access to the WHD web interface to trusted IP addresses and users. Do not expose the interface directly to the public internet if possible. Use a VPN or other secure access solution.
  3. Hunt for Compromise: Given the active exploitation, it is crucial to assume compromise and hunt for signs of malicious activity on any unpatched systems. Review logs for the period prior to patching and look for indicators of compromise (IOCs) such as suspicious network connections or newly created files/processes.

Timeline of Events

1
February 5, 2026
CISA adds CVE-2025-40551 to the Known Exploited Vulnerabilities (KEV) catalog.
2
February 5, 2026
This article was published
3
February 6, 2026
Deadline for U.S. Federal Civilian Executive Branch agencies to patch CVE-2025-40551.

Article Updates

February 11, 2026

New details reveal attackers are using Velociraptor for post-exploitation, lateral movement, and persistence after exploiting the SolarWinds RCE flaw.

MITRE ATT&CK Mitigations

The primary and most critical mitigation is to apply the patch from SolarWinds immediately.

Mapped D3FEND Techniques:

If patching is not immediately possible, isolate the WHD server from the internet and restrict access to a minimal set of trusted internal IPs.

Mapped D3FEND Techniques:

Use an EDR to monitor and alert on the WHD process spawning suspicious child processes, a key indicator of exploitation.

Mapped D3FEND Techniques:

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CISAKEVSolarWindsCVE-2025-40551RCEVulnerabilityActive Exploitation

📢 Share This Article

Help others stay informed about cybersecurity threats