SolarWinds Web Help Desk Exploited: Multi-Stage RCE Attacks Explained & How to Protect Yourself (2026)

A critical vulnerability in SolarWinds Web Help Desk (WHD) is being actively exploited, opening the door to full network compromise! Microsoft has uncovered a sophisticated, multi-stage attack where threat actors are leveraging internet-exposed SolarWinds WHD instances to gain initial access and then move stealthily throughout an organization's network, targeting valuable assets. This is a serious wake-up call for any organization relying on this software.

But here's where it gets controversial... It's not entirely clear whether the attackers are exploiting the recently disclosed critical flaws (CVE-2025-40551, with a severe CVSS score of 9.8, and CVE-2025-40536, scoring 8.1) or a previously patched vulnerability (CVE-2025-26399, also a critical 9.8). Microsoft researchers noted that since the attacks occurred in December 2025, and the affected machines were vulnerable to both older and newer flaws simultaneously, pinpointing the exact entry point is difficult. This ambiguity itself raises questions about how organizations are managing their patching cycles.

Let's break down what these vulnerabilities mean for the uninitiated. CVE-2025-40536 is a security control bypass, meaning an attacker who isn't even authenticated can potentially access restricted features. On the other hand, CVE-2025-40551 and CVE-2025-26399 are untrusted data deserialization vulnerabilities. In simpler terms, these allow attackers to trick the system into executing malicious code by feeding it specially crafted data, leading to remote code execution (RCE). Imagine someone tricking your computer into running a program it shouldn't, just by sending you a seemingly harmless file.

In response to the severity, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-40551 to its Known Exploited Vulnerabilities (KEV) catalog, indicating it's actively being used in the wild. Federal agencies were given a strict deadline of February 6, 2026, to implement the necessary fixes.

And this is the part most people miss... Once inside, the attackers achieved unauthenticated RCE, allowing them to run arbitrary commands directly within the WHD application. Researchers observed that the compromised WHD instance then launched PowerShell to download and execute payloads using BITS (Background Intelligent Transfer Service), a legitimate Windows service. This is a classic example of 'living off the land' – using legitimate tools to carry out malicious activities.

The attackers didn't stop there. They proceeded to download components from Zoho ManageEngine, a legitimate remote monitoring and management (RMM) solution. This allowed them to maintain persistent remote control over the infected systems. Their subsequent actions were highly systematic:

  • They meticulously enumerated sensitive domain users and groups, including high-privilege accounts like Domain Admins. This is like a burglar casing a house, identifying who lives there and where the valuables are kept.
  • They established persistence through methods like reverse SSH and RDP access. In a particularly cunning move, they attempted to create a scheduled task to launch a QEMU virtual machine under the SYSTEM account at startup. This is a sophisticated technique to cover their tracks by operating within a virtualized environment while still exposing SSH access through port forwarding. Could this be the future of stealthy attacks?
  • On some systems, they employed DLL side-loading. They used a legitimate Windows executable, "wab.exe" (associated with the Windows Address Book), to load a malicious DLL named "sspicli.dll". This allowed them to dump the contents of LSASS memory – a critical process that holds user credentials – to steal sensitive information.

In at least one documented instance, Microsoft reported that the attackers executed a DCSync attack. This is a highly advanced technique where an attacker simulates a Domain Controller (DC) to request password hashes and other sensitive data directly from the Active Directory database. This is akin to impersonating a bank manager to get access to all the customer records.

So, what can you do to protect yourself? Microsoft advises keeping your WHD instances up-to-date, actively searching for and removing any unauthorized RMM tools, rotating service and admin accounts regularly, and isolating compromised machines to prevent further spread.

Microsoft rightly points out, "This activity reflects a common but high-impact pattern: a single exposed application can provide a path to full domain compromise when vulnerabilities are unpatched or insufficiently monitored." They emphasize the importance of defense in depth, timely patching of internet-facing services, and behavior-based detection across identity, endpoint, and network layers.

This incident highlights a crucial question: Are organizations truly prioritizing the security of their internet-facing applications, or are they leaving themselves wide open to these sophisticated attacks? What are your thoughts on the effectiveness of 'living off the land' techniques by attackers? Let us know in the comments below!

SolarWinds Web Help Desk Exploited: Multi-Stage RCE Attacks Explained & How to Protect Yourself (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6352

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.