SolarWinds WHD Unauth RCE: Why CISA KEV Means Patch Now [Prime Cyber Insights]
[00:00] Aaron Cole: This is Prime Cyber Insights.
[00:02] Aaron Cole: I'm Aaron Cole.
[00:03] Aaron Cole: Today's headline is pretty simple.
[00:05] Aaron Cole: Sissa just tagged a SolarWinds web help desk flaw as actively exploited.
[00:10] Aaron Cole: And yeah, it's the kind of bug you don't schedule for later.
[00:14] Lauren Mitchell: I'm Lauren Mitchell.
[00:16] Lauren Mitchell: We're going to walk through what CISA's KevListing means operationally,
[00:20] Lauren Mitchell: what to patch, what to look for after you patch,
[00:24] Lauren Mitchell: and why that window between disclosure and exploitation just keeps shrinking.
[00:28] Aaron Cole: Let's get specific.
[00:30] Aaron Cole: CISA added CVE 2025-40551 in SolarWinds Web Help Desk
[00:37] Aaron Cole: to the Known Exploited Vulnerabilities Catalog.
[00:39] Aaron Cole: It's a CVSS 9.8 issue, deserialization of untrusted data that can lead to remote code
[00:46] Aaron Cole: execution, and critically, it can be exploited without authentication.
[00:51] Aaron Cole: That combo, unauthenticated plus RCE, is a high-leverage initial access vector.
[00:56] Aaron Cole: Even without public details on who's weaponizing it or at what scale,
[01:00] Aaron Cole: actively exploited Issa is telling you this is happening in the real world, not just in theory.
[01:06] Aaron Cole: So, the immediate playbook is boring but urgent.
[01:10] Aaron Cole: First, find every Web Help Desk instance on-prem tucked into DMZs,
[01:15] Aaron Cole: or, you know, forgotten in a lab VLAN.
[01:18] Aaron Cole: Second, upgrade to WHD 2026.1.
[01:22] Aaron Cole: because SolarWinds shipped fixes not just for this CVE,
[01:26] Aaron Cole: but also a cluster of other high-severity ones
[01:29] Aaron Cole: released alongside it.
[01:31] Lauren Mitchell: And third,
[01:31] Lauren Mitchell: Treat patching as the start, not the finish.
[01:35] Lauren Mitchell: If exploitation is active, you need post-patch validation.
[01:39] Lauren Mitchell: Pull web server and application logs around suspicious requests,
[01:42] Lauren Mitchell: check for new processes spawned by the service account,
[01:45] Lauren Mitchell: and review any outbound connections from the WHD host
[01:49] Lauren Mitchell: that don't match normal ticketing behavior.
[01:52] Aaron Cole: CISA didn't stop with SolarWinds.
[01:54] Aaron Cole: They also added Sangoma-free PBX bugs, one that's essentially an improper authentication bypass
[02:00] Aaron Cole: and another OS-commanded Gection, and a GitLab SSRF that researchers previously flagged
[02:10] Aaron Cole: during coordinated SSRF scanning surges across multiple platforms.
[02:15] Lauren Mitchell: The pattern here matters.
[02:17] Lauren Mitchell: Attackers love externally reachable admin and workflow systems.
[02:20] Lauren Mitchell: Helpdesk, CICD, VoIP management, because compromise is both quiet and powerful.
[02:27] Lauren Mitchell: An SSRF and GitLab can become internal recon, metadata harvesting, or a pivot into internal services.
[02:34] Lauren Mitchell: Free PBX issues can mean call infrastructure exposure and a foothold into networks that treat telephony as not IT.
[02:42] Aaron Cole: Now, a defensive upgrade to pair with all of this.
[02:46] Aaron Cole: Microsoft is adding Sysmon functionality into Windows in insider dev and beta builds.
[02:51] Aaron Cole: Sysmon has long been a go-to for deeper endpoint telemetry,
[02:55] Aaron Cole: but at enterprise scale, packaging, deployment, and support have been a pain.
[03:00] Lauren Mitchell: Built-in Sysmon, disabled by default,
[03:03] Lauren Mitchell: could lower friction for collecting high-value events into the standard Windows event log,
[03:08] Lauren Mitchell: where SIEM and EDR tools can pick it up.
[03:11] Lauren Mitchell: The key operational notes?
[03:13] Lauren Mitchell: Enabling it requires PowerShell, and Microsoft says you'll need to uninstall any existing
[03:19] Lauren Mitchell: Sysmon before turning on the built-in version.
[03:21] Aaron Cole: NetNet, if you run SolarWinds Web Help Desk, treat CVE 2025-405-51 like a now problem.
[03:29] Aaron Cole: Inventory, patch to 2026.1, then hunt for signs of exploitation.
[03:34] Aaron Cole: And zooming out, Kev is your prioritization engine.
[03:38] Aaron Cole: If it's on the list, it belongs at the top of your change calendar.
[03:42] Michael Turner: And that's today's Prime Cyber Insights.
[03:44] Michael Turner: Subscribe for the daily rundown and for links and notes head to pci.neuralnewscast.com.
[03:51] Michael Turner: Neural Newscast is AI-assisted, human-reviewed.
[03:55] Michael Turner: View our AI transparency policy at neuralnewscast.com.
