SolarWinds Web Help Desk RCE Goes Full Panic Mode: CISA Says Patch NOW
Hey devs, CISA just slapped a critical SolarWinds Web Help Desk vulnerability onto its Known Exploited Vulnerabilities list, confirming it’s under active attack. This unauthenticated RCE flaw lets hackers run wild on your servers without breaking a sweat.
Digging into the nitty-gritty: The star of the show is CVE-2025-40551 (CVSS 9.8), a deserialization bug in SolarWinds Web Help Desk that opens the door to remote code execution. SolarWinds dropped patches last week in version 2026.1, bundling fixes for related nasties like CVE-2025-40536 (8.1), CVE-2025-40537 (7.5), CVE-2025-40552/53/54 (all 9.8). CISA’s mandating federal agencies hunt this down by today—February 6, 2026—with the rest by Feb 24. No public deets on attack tactics or targets yet, but threat actors are lightning-fast on fresh flaws.
Bonus chaos: CISA also KEV’d Sangoma FreePBX bugs—CVE-2019-19006 (improper auth, CVSS 9.8, exploited since 2020), CVE-2025-64328 (command injection, 8.6), and GitLab’s CVE-2021-39935 (SSRF, 7.5). Fortinet caught actors dropping EncystPHP webshells via FreePBX exploits, grabbing DB configs, spawning root users, and hijacking SSH for persistence.
So What for You, Dev?
If you’re running Web Help Desk or FreePBX anywhere—especially in prod or client stacks—this is your 4AM wake-up call. Unpatched RCE means attackers own your box, pivot to your network, steal data, or worse. Devs: Audit your deps today, push updates, and scan for IOCs like weird SSH keys or Asterisk tweaks. Federal deadline or not, one breach and you’re explaining to the boss why “it was patched last week” doesn’t cut it. Proactive patching isn’t optional; it’s your firewall against zero-days turning viral.
Final Take
Speed kills in cyber—patch fast, scan harder, or watch your help desk become their command center. Stay vigilant, folks.

