Read Time: 3 minutes

We are seeing confirmed reports of a critical security hole (CVE-2025-40551) in SolarWinds Web Help Desk as of February 3, 2026. Specifically, hackers are using this zero-day flaw to take over computer systems before companies can fix them.

The Evidence

First, the vulnerability carries a CVSS score of 9.8 which marks it as a top-level threat. According to the official SolarWinds Security Advisory, the problem involves a data processing error that lets attackers run their own commands. Initially, security researchers at Horizon3.ai discovered the bug and warned that it requires no login or user help to work. Subsequently, the Cybersecurity and Infrastructure Security Agency (CISA) added this flaw to its Known Exploited Vulnerabilities list on February 3 after seeing real attacks. Specifically, hackers send a hidden message to the help desk software that tricks the server into giving them full power. Furthermore, independent experts at Tenable and Wiz have verified that this exploit is easy for criminals to use.

Who Should Be Concerned

Most importantly, any business using SolarWinds Web Help Desk version 12.8.8 Hotfix 1 or older must act right away. Moreover, schools, government offices, and health clinics face a high risk because they use this tool to track IT problems. In particular, IT managers and security teams need to prioritize this fix before the weekend starts. Therefore, company leaders should make sure their teams check for this software on their servers immediately.

Historical Context

Notably, this is not the first time hackers have targeted this specific help desk tool. Similarly, this new flaw is very close to a bug found in 2024 called CVE-2024-28986 which also let attackers steal data. In fact, security experts have seen a huge increase in attacks against management software over the last year. As a result, bad actors often try to find new ways to bypass old security fixes to get back into networks they once controlled.

Detailed Impact Analysis

Currently, thousands of servers around the world are still open to this dangerous attack. Once a hacker gets inside, they can read private emails, change user passwords, and steal sensitive customer files. Meanwhile, CISA reports that attackers are already using this flaw to move through company networks and plant ransomware. Consequently, a single unpatched server could lead to a total business shutdown and massive data loss. Based on current trends, we expect the number of attacks to grow quickly now that the details are public.

Immediate Actions Required

Immediately, you must update your software to SolarWinds Web Help Desk version 2026.1 to stay safe. Specifically, organizations must finish this update within 24 hours because hackers are already looking for victims. Next, you should check your server logs for any strange logins from the default “client” account. However, if you cannot patch the system today, you should disconnect the help desk server from the internet right away. Additionally, you should change all administrator passwords once the new patch is in place. After the update, run a full security scan to make sure no hackers left hidden backdoors behind.

Additional Resources

For complete technical details, please read the SolarWinds Release Notes. Additionally, you can find the official government warning at the CISA KEV Catalog.

Get Expert Help

If your organization needs expert help to fix this bug or check for signs of a hack, DefendMyBusiness is here to guide you. Our team specializes in finding weak spots and building strong defense plans to keep your data safe from advanced threats. Schedule a free security consultation now to get expert analysis and protection within 24 hours.

Unlock Expert Insights