Security

SolarWinds Web Help Desk Exploitation Warning

3 min read

Summary

Microsoft is warning that internet-exposed SolarWinds Web Help Desk servers are being actively exploited for unauthenticated remote code execution, with attackers chaining built-in tools like PowerShell and BITS, plus legitimate remote management software, to stay stealthy and expand access. The activity matters because a single vulnerable WHD instance can become a low-noise path to credential theft, privilege escalation, and broader domain compromise, underscoring the need to patch known WHD flaws and monitor for unusual admin-tool usage.

Need help with Security?Talk to an Expert

Introduction: why this matters

Internet-exposed line-of-business tools remain a high-value target, and Microsoft has observed real-world attacks where compromising a single SolarWinds Web Help Desk (WHD) instance became a stepping stone to broader domain compromise. The campaign is notable for “living-off-the-land” (LoTL) behavior, use of legitimate admin tooling, and low-noise persistence—tactics that often evade signature-only controls.

What’s new / what Microsoft observed

Microsoft Defender Research identified multi-stage intrusions starting from exposed WHD servers:

  • Initial access via WHD exploitation (RCE): Successful exploitation enabled unauthenticated remote code execution in the WHD application context. Microsoft has not confirmed the specific vulnerability used, but notes affected systems were vulnerable to CVE-2025-40551, CVE-2025-40536, and CVE-2025-26399.
  • Payload delivery using built-in tools: After compromise, the WHD service spawned PowerShell and used BITS to download and execute payloads.
  • Legitimate RMM used for control: In several cases, attackers installed components of Zoho ManageEngine (RMM) (e.g., artifacts like ToolsIQ.exe) to gain interactive access.
  • Credential access and privilege escalation:
    • Domain user/group enumeration including Domain Admins.
    • DLL sideloading via wab.exe loading a malicious sspicli.dll, enabling LSASS access and stealthier credential theft.
    • At least one incident progressed to DCSync, indicating high-privilege credential access.
  • Persistence and evasion:
    • Reverse SSH and RDP access.
    • A particularly stealthy technique: a scheduled task launching QEMU under SYSTEM at startup, effectively hiding activity in a VM while forwarding SSH over a host port.

Impact on IT admins and end users

  • Admins: Any publicly reachable WHD instance should be treated as a potential entry point to domain-wide compromise. Because attackers blend into administrative activity (PowerShell/BITS/RDP/SSH), behavior-based monitoring across endpoint, identity, and network is essential.
  • End users: The downstream impact can include account takeover, password theft, service disruption, and broader ransomware or data-theft risk once domain control is achieved.
  1. Patch and reduce exposure immediately
    • Apply updates addressing CVE-2025-40551, CVE-2025-40536, and CVE-2025-26399.
    • Remove public exposure where possible, restrict admin paths, and increase logging (including WHD components such as the Ajax Proxy).
  2. Hunt for post-exploitation indicators
    • Use Microsoft Defender Vulnerability Management (MDVM) to locate vulnerable WHD servers.
    • In Defender XDR Advanced Hunting, look for suspicious process chains originating from WHD (e.g., wrapper.exe spawning PowerShell/BITS), and for ManageEngine/RMM artifacts added after the suspected compromise window.
  3. Evict unauthorized remote tooling
    • Identify and remove unexpected ManageEngine RMM components and investigate how they were deployed.
  4. Contain and recover
    • Isolate suspected hosts and rotate credentials starting with service accounts and admins reachable from WHD.
    • Investigate for identity compromise signals (pass-the-hash/over-pass-the-hash) and DCSync indicators.

Microsoft notes analysis is ongoing; defenders should assume active exploitation continues and prioritize internet-facing application hygiene and layered detection.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft Defender XDRSolarWinds Web Help DeskCVEvulnerability managementincident response

Related Posts

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.