SolarWinds addressed four critical Web Help Desk flaws
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容,了解主要信息。 文章主要讲的是SolarWinds修复了Web Help Desk中的六个漏洞,其中有四个是关键漏洞,允许未经身份验证的攻击者进行远程代码执行或绕过认证。这些漏洞的CVSS评分都是9.8分,属于严重级别。此外,还有两个高危漏洞,涉及安全控制绕过和硬编码凭据的问题。SolarWinds已经发布了2026.1版本来修复这些问题。 接下来,我需要将这些信息浓缩到100字以内。首先确定关键点:SolarWinds修复了六个漏洞,四个关键漏洞允许无认证攻击者执行代码或绕过认证,CVSS评分高,另外还有两个高危漏洞。最后提到修复版本。 现在组织语言:SolarWinds修复了Web Help Desk的六个安全漏洞,其中四个关键漏洞允许未经身份验证的攻击者进行远程代码执行或绕过认证。此外还有两个高危漏洞涉及安全控制和硬编码凭据问题。所有问题已在2026.1版本中修复。 检查字数是否在限制内,并确保信息准确全面。 </think> SolarWinds修复了Web Help Desk中的六个安全漏洞,其中四个关键漏洞允许未经身份验证的攻击者进行远程代码执行或绕过认证。此外还发现两个高危漏洞涉及安全控制和硬编码凭据问题。所有问题已在2026.1版本中修复。 2026-1-29 19:17:4 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

SolarWinds addressed four critical Web Help Desk flaws

SolarWinds patched six Web Help Desk vulnerabilities, including four critical flaws exploitable without authentication for RCE or auth bypass.

SolarWinds released security updates to address six Web Help Desk vulnerabilities, including four critical bugs that allow unauthenticated remote code execution or authentication bypass.

The three critical flaws found by watchTowr, and specifically by researcher Piotr Bazydlo, affect SolarWinds Web Help Desk and can be exploited without authentication, exposing affected systems to severe risk.

The first issue, tracked as CVE-2025-40552, is an authentication bypass vulnerability that allows a remote attacker to circumvent access controls and execute actions and methods that should only be available to authenticated users. Exploitation of this flaw could give an attacker broad control over the application.

The second vulnerability, CVE-2025-40553, is caused by the deserialization of untrusted data and can be exploited to achieve remote code execution. Because authentication is not required, an attacker could run arbitrary commands on the underlying host system, potentially leading to a full system compromise.

The third flaw, CVE-2025-40554, is another authentication bypass vulnerability that enables an attacker to invoke specific internal actions within Web Help Desk without proper authorization. While more targeted in scope, successful exploitation could still allow unauthorized access to sensitive functionality and be used as a stepping stone for further attacks.

The fourth critical flaw, tracked as CVE-2025-40551, was found by Jimi Sebree of Horizon3.ai and affects SolarWinds Web Help Desk through the deserialization of untrusted data. This vulnerability allows an unauthenticated attacker to achieve remote code execution, enabling the execution of arbitrary commands on the underlying host system and potentially leading to a complete compromise of the affected server. Due to its impact and lack of authentication requirements, the issue is rated critical (CVSS 9.8).

“We discovered a handful of security issues in Solarwinds Web Help Desk. These issues include…

  • … an unauthenticated remote-code execution vulnerability via deserialization.
  • … static credentials that allow limited access to authenticated functionality.
  • … a security protection bypass regarding protected site actions.

These vulnerabilities are easily exploitable and enable unauthenticated attackers to achieve remote code execution on vulnerable Solarwinds Web Help Desk instances.” reads the advisory published by Horizon3. “Solarwinds has stated that these issues are patched in Web Help Desk version 2026.1, and we encourage all users to upgrade as soon as possible.

All the critical flaws have a CVSS score of 9.8.

In addition to this critical issue, Horizon3.ai also identified two high-severity vulnerabilities. The first, CVE-2025-40536, is a security control bypass vulnerability that could allow an unauthenticated attacker to access certain restricted functionality within Web Help Desk. While more limited in scope than the critical flaws, successful exploitation could still expose sensitive features and weaken the application’s overall security posture.

The second high-severity issue, CVE-2025-40537, involves the presence of hardcoded credentials in SolarWinds Web Help Desk. Under specific conditions, this vulnerability could be exploited to gain access to administrative functions, significantly increasing the risk of privilege escalation and unauthorized system management.

Together, these findings underscore systemic weaknesses in authentication, authorization, and secure coding practices within SolarWinds Web Help Desk, particularly when combined with the previously disclosed critical vulnerabilities.

Web Help Desk version 2026.1 fixed all these six vulnerabilities.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SolarWinds)




文章来源: https://securityaffairs.com/187470/security/solarwinds-addressed-four-critical-web-help-desk-flaws.html
如有侵权请联系:admin#unsafe.sh