CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解主要内容。 文章主要讲的是美国网络安全和基础设施安全局(CISA)将SolarWinds Web Help Desk的一个关键安全漏洞加入到了已知被利用的漏洞目录中。这个漏洞CVE-2025-40551的CVSS评分是9.8,属于高危漏洞,可以导致远程代码执行,而且不需要认证就能被利用。 SolarWinds已经发布了修复补丁,修复了多个漏洞,包括这个CVE和其他几个。此外,CISA还添加了其他三个漏洞到KEV目录中,涉及Sangoma FreePBX和GitLab的问题。最后提到联邦政府机构需要在特定日期前修复这些漏洞。 用户的需求是希望得到一个简洁的总结,所以我要抓住主要点:CISA新增了SolarWinds的高危漏洞到目录中,并提到修复时间和其他相关漏洞。同时要控制在100字以内。 现在组织语言:CISA将SolarWinds Web Help Desk的高危漏洞加入已知被利用目录,并要求修复。该漏洞CVSS评分9.8,可导致远程代码执行且无需认证。此外还有其他三个漏洞被加入目录,并规定修复期限。 检查字数是否符合要求,并确保没有使用禁止的开头语句。 </think> 美国网络安全机构CISA将SolarWinds Web Help Desk的高危漏洞CVE-2025-40551(CVSS 9.8)加入已知被利用目录,并要求修复。该漏洞可导致远程代码执行且无需认证。此外,CISA还新增了其他三个高危漏洞至目录,并规定修复期限。 2026-2-4 05:50:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Software Security / Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks.

The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for remote code execution.

"SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine," CISA said. "This could be exploited without authentication."

SolarWinds issued fixes for the flaw last week, along with CVE-2025-40536 (CVSS score: 8.1), CVE-2025-40537 (CVSS score: 7.5), CVE-2025-40552 (CVSS score: 9.8), CVE-2025-40553 (CVSS score: 9.8), and CVE-2025-40554 (CVSS score: 9.8), in WHD version 2026.1.

There are currently no public reports about how the vulnerability is being weaponized in attacks, who may be the targets, or the scale of such efforts. It's the latest illustration of how quickly threat actors are moving to exploit newly disclosed flaws.

Also added to the KEV catalog are three other vulnerabilities -

  • CVE-2019-19006 (CVSS score: 9.8) - An improper authentication vulnerability in Sangoma FreePBX that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX administrator
  • CVE-2025-64328 (CVSS score: 8.6) - An operating system command injection vulnerability in Sangoma FreePBX that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function and potentially obtain remote access to the system as an asterisk user
  • CVE-2021-39935 (CVSS score: 7.5/6.8) - A server-side request forgery (SSRF) vulnerability in GitLab Community and Enterprise Editions that could allow unauthorized external users to perform Server Side Requests via the CI Lint API

It's worth noting that the exploitation of CVE-2021-39935 was highlighted by GreyNoise in March 2025, as part of a coordinated surge in the abuse of SSRF vulnerabilities in multiple platforms, including DotNetNuke, Zimbra Collaboration Suite, Broadcom VMware vCenter, ColumbiaSoft DocumentLocator, BerriAI LiteLLM, and Ivanti Connect Secure.

Federal Civilian Executive Branch (FCEB) agencies are required to fix CVE-2025-40551 by February 6, 2026, and the rest by February 24, 2026, pursuant to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
如有侵权请联系:admin#unsafe.sh