CISA orders federal agencies to patch exploited SolarWinds bug by Friday

A vulnerability affecting a popular IT help desk tool from software company SolarWinds is being exploited by hackers, according to the U.S. cyber defense agency. 

Federal civilian agencies will have until Friday to patch CVE-2025-40551, a critical vulnerability reported by SolarWinds last week. The company said security researchers at Horizon3.ai discovered the vulnerability and reported it to them. 

CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform used by many large organizations to handle  ticketing, asset tracking and other tasks. The tool helps companies centralize IT support operations.

Horizon3.ai researcher Jimi Sebree published a blog about the bug that traced the issue back to another vulnerability discovered in 2024. That bug, CVE-2024-28986, was also added to these Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities list at the time. 

According to Sebree, CVE-2025-40551 is the latest in a series of bugs that are centered around bypasses of fixes to CVE-2024-28986. Sebree discovered and reported CVE-2025-40551 to SolarWinds on December 5. 

Solarwinds has published an update in Web Help Desk version 2026.1 that fixes the issues. The company fixed CVE-2025-40551 and several other security bugs that were recently discovered by researchers. 

CISA added CVE-2025-40551 to the Known Exploited Vulnerabilities catalog alongside three other vulnerabilities that federal civilian agencies will need to patch before the end of the month.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Next Post

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Related Posts

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown published this week. "These documents and
Read More