PROBABLYPWNED
VulnerabilitiesJanuary 30, 20263 min read

SolarWinds Web Help Desk Gets Emergency Patches for Four Critical Flaws

Deserialization bugs and authentication bypasses enable unauthenticated RCE. Attackers have targeted WHD vulnerabilities before.

Marcus Chen

SolarWinds released patches Tuesday for four critical vulnerabilities in Web Help Desk, its IT support ticketing platform used across government agencies, healthcare systems, and educational institutions. Two of the flaws allow unauthenticated remote code execution—the kind of access that gives attackers complete control over affected systems.

The vulnerabilities were reported by researchers from Horizon3.ai and watchTowr. No active exploitation has been observed yet, but SolarWinds' history with Web Help Desk vulnerabilities suggests attackers won't wait long. CISA previously issued emergency directives after threat actors exploited earlier WHD flaws against federal networks.

The Critical Vulnerabilities

CVE-2025-40553 and CVE-2025-40551 are deserialization of untrusted data vulnerabilities. Both allow unauthenticated attackers to execute arbitrary commands on target systems remotely. CVE-2025-40553 was discovered by watchTowr's Piotr Bazydlo; CVE-2025-40551 came from Horizon3.ai researcher Jimi Sebree.

Deserialization vulnerabilities occur when applications reconstruct objects from external data without proper validation. Attackers craft malicious serialized objects that, when processed by the vulnerable application, execute arbitrary code. These flaws are particularly dangerous because they typically require no authentication and can be triggered remotely.

CVE-2025-40552 and CVE-2025-40554 are authentication bypass vulnerabilities, also reported by Bazydlo. These flaws enable remote attackers to execute actions "intended to be gated by authentication" without providing valid credentials. Combined with the RCE flaws, an attacker could bypass login controls and then execute code—a complete compromise chain.

All four critical vulnerabilities have CVSS scores of 9.8.

Additional High-Severity Issues

The patch release also addresses:

CVE-2025-40536: An access control bypass allowing attackers to reach functionality intended for authenticated users only.

CVE-2025-40537: A hardcoded credentials issue that could let low-privileged attackers access administrative functions "under certain conditions." SolarWinds hasn't disclosed what those conditions are.

Why Web Help Desk Gets Targeted

Web Help Desk runs in environments with substantial access. IT ticketing systems typically have network connectivity to reach endpoints for remote support, store credentials for service accounts, and maintain records of internal systems and configurations.

Compromising the help desk platform gives attackers:

  • Lateral movement paths: Service accounts with broad network access
  • Internal reconnaissance data: Tickets often contain system names, IP addresses, and troubleshooting details
  • Social engineering material: User complaints and IT responses reveal organizational details
  • Potential persistence: Help desk software runs continuously and often with elevated privileges

SolarWinds specifically notes that Web Help Desk is deployed across "large corporations, healthcare organizations, educational institutions, and government agencies." These sectors handle sensitive data and provide high-value targets.

Past Exploitation History

This isn't Web Help Desk's first security crisis. In August 2024, CISA added CVE-2024-28986—a different deserialization RCE in WHD—to the Known Exploited Vulnerabilities catalog after confirming active attacks against federal agencies. That vulnerability, like the current flaws, allowed unauthenticated code execution.

Organizations that didn't learn from that incident are running out of warnings. The pattern is clear: Web Help Desk vulnerabilities get exploited quickly after disclosure.

Immediate Actions

  1. Upgrade to version 2026.1 - SolarWinds emphasizes this should happen outside normal patching cycles
  2. Audit service account permissions - Reduce WHD's network access to minimum necessary
  3. Review authentication logs - Look for anomalous access patterns before assuming you're unaffected
  4. Consider network segmentation - Limit which systems can reach the WHD server

Given the deserialization attack surface and authentication bypass capabilities, organizations should treat this as an emergency rather than routine maintenance. The technical barriers to exploitation are low, and proof-of-concept development typically follows quickly after vulnerability details become public.

SolarWinds' security advisory provides version-specific guidance and download links for the patched release.

Related Articles