SolarWinds WHD Unauth RCE: Why CISA KEV Means Patch Now [Prime Cyber Insights]

CISA has added a critical SolarWinds Web Help Desk vulnerability—CVE-2025-40551, a CVSS 9.8 unauthenticated remote code execution risk—to its Known Exploited Vulnerabilities catalog, signaling confirmed active exploitation and an immediate patch priority. SolarWinds has already shipped fixes in Web Help Desk 2026.1, and U.S. federal agencies now face tight remediation deadlines under BOD 22-01. In this episode, we break down what “deserialization of untrusted data” typically implies for defenders, why unauthenticated RCE is a high-leverage entry point, and how to triage exposure fast: inventory WHD instances, upgrade, and hunt for signs of compromise. We also connect the SolarWinds move to CISA’s broader KEV updates—two Sangoma FreePBX flaws and a GitLab SSRF (CVE-2021-39935) previously observed in coordinated scanning surges—highlighting how quickly attackers pivot from disclosure to weaponization. Finally, we discuss a practical defense upgrade: Microsoft bringing Sysmon functionality into Windows Insider builds, reducing operational friction for endpoint telemetry at scale.

[00:00] Aaron Cole: This is Prime Cyber Insights.
[00:02] Aaron Cole: I'm Aaron Cole.
[00:03] Aaron Cole: Today's headline is pretty simple.
[00:05] Aaron Cole: Sissa just tagged a SolarWinds web help desk flaw as actively exploited.
[00:10] Aaron Cole: And yeah, it's the kind of bug you don't schedule for later.
[00:14] Lauren Mitchell: I'm Lauren Mitchell.
[00:16] Lauren Mitchell: We're going to walk through what CISA's KevListing means operationally,
[00:20] Lauren Mitchell: what to patch, what to look for after you patch,
[00:24] Lauren Mitchell: and why that window between disclosure and exploitation just keeps shrinking.
[00:28] Aaron Cole: Let's get specific.
[00:30] Aaron Cole: CISA added CVE 2025-40551 in SolarWinds Web Help Desk
[00:37] Aaron Cole: to the Known Exploited Vulnerabilities Catalog.
[00:39] Aaron Cole: It's a CVSS 9.8 issue, deserialization of untrusted data that can lead to remote code
[00:46] Aaron Cole: execution, and critically, it can be exploited without authentication.
[00:51] Aaron Cole: That combo, unauthenticated plus RCE, is a high-leverage initial access vector.
[00:56] Aaron Cole: Even without public details on who's weaponizing it or at what scale,
[01:00] Aaron Cole: actively exploited Issa is telling you this is happening in the real world, not just in theory.
[01:06] Aaron Cole: So, the immediate playbook is boring but urgent.
[01:10] Aaron Cole: First, find every Web Help Desk instance on-prem tucked into DMZs,
[01:15] Aaron Cole: or, you know, forgotten in a lab VLAN.
[01:18] Aaron Cole: Second, upgrade to WHD 2026.1.
[01:22] Aaron Cole: because SolarWinds shipped fixes not just for this CVE,
[01:26] Aaron Cole: but also a cluster of other high-severity ones
[01:29] Aaron Cole: released alongside it.
[01:31] Lauren Mitchell: And third,
[01:31] Lauren Mitchell: Treat patching as the start, not the finish.
[01:35] Lauren Mitchell: If exploitation is active, you need post-patch validation.
[01:39] Lauren Mitchell: Pull web server and application logs around suspicious requests,
[01:42] Lauren Mitchell: check for new processes spawned by the service account,
[01:45] Lauren Mitchell: and review any outbound connections from the WHD host
[01:49] Lauren Mitchell: that don't match normal ticketing behavior.
[01:52] Aaron Cole: CISA didn't stop with SolarWinds.
[01:54] Aaron Cole: They also added Sangoma-free PBX bugs, one that's essentially an improper authentication bypass
[02:00] Aaron Cole: and another OS-commanded Gection, and a GitLab SSRF that researchers previously flagged
[02:10] Aaron Cole: during coordinated SSRF scanning surges across multiple platforms.
[02:15] Lauren Mitchell: The pattern here matters.
[02:17] Lauren Mitchell: Attackers love externally reachable admin and workflow systems.
[02:20] Lauren Mitchell: Helpdesk, CICD, VoIP management, because compromise is both quiet and powerful.
[02:27] Lauren Mitchell: An SSRF and GitLab can become internal recon, metadata harvesting, or a pivot into internal services.
[02:34] Lauren Mitchell: Free PBX issues can mean call infrastructure exposure and a foothold into networks that treat telephony as not IT.
[02:42] Aaron Cole: Now, a defensive upgrade to pair with all of this.
[02:46] Aaron Cole: Microsoft is adding Sysmon functionality into Windows in insider dev and beta builds.
[02:51] Aaron Cole: Sysmon has long been a go-to for deeper endpoint telemetry,
[02:55] Aaron Cole: but at enterprise scale, packaging, deployment, and support have been a pain.
[03:00] Lauren Mitchell: Built-in Sysmon, disabled by default,
[03:03] Lauren Mitchell: could lower friction for collecting high-value events into the standard Windows event log,
[03:08] Lauren Mitchell: where SIEM and EDR tools can pick it up.
[03:11] Lauren Mitchell: The key operational notes?
[03:13] Lauren Mitchell: Enabling it requires PowerShell, and Microsoft says you'll need to uninstall any existing
[03:19] Lauren Mitchell: Sysmon before turning on the built-in version.
[03:21] Aaron Cole: NetNet, if you run SolarWinds Web Help Desk, treat CVE 2025-405-51 like a now problem.
[03:29] Aaron Cole: Inventory, patch to 2026.1, then hunt for signs of exploitation.
[03:34] Aaron Cole: And zooming out, Kev is your prioritization engine.
[03:38] Aaron Cole: If it's on the list, it belongs at the top of your change calendar.
[03:42] Michael Turner: And that's today's Prime Cyber Insights.
[03:44] Michael Turner: Subscribe for the daily rundown and for links and notes head to pci.neuralnewscast.com.
[03:51] Michael Turner: Neural Newscast is AI-assisted, human-reviewed.
[03:55] Michael Turner: View our AI transparency policy at neuralnewscast.com.

SolarWinds WHD Unauth RCE: Why CISA KEV Means Patch Now [Prime Cyber Insights]
Broadcast by