VulnerabilitiesHIGH

New Exploits Unleashed for SolarWinds and FreeBSD!

R7Rapid7 Blog
CVE-2025-40536CVE-2025-40551CVE-2025-14558CVE-2026-1340SolarWinds
🎯

Basically, new security flaws in software let hackers take control of systems.

Quick Summary

Metasploit has released new exploits for SolarWinds and FreeBSD vulnerabilities. These flaws could allow hackers to seize control of systems. Immediate software updates are crucial to protect your data and services.

What Happened

In a significant update, the Metasploit team has rolled out new exploit modules targeting vulnerabilities in popular software, including SolarWinds and FreeBSD. These vulnerabilities could allow attackers to gain unauthorized access and control over systems. Notably, the SolarWinds Web Help Desk vulnerabilities, tracked as CVE-2025-40536? and CVE-2025-40551, can let an attacker operate with the highest system privileges.

The update introduces several new exploits, including a command injection? vulnerability in FreeBSD's rtsol/rtsold daemons (CVE-2025-14558). This flaw allows attackers to execute commands as root, which can lead to severe consequences for affected systems. Additionally, a recently discovered unauthenticated? remote code execution (RCE?) vulnerability in Ivanti Endpoint Manager Mobile (CVE-2026-1340) is also part of this release, which has already been exploited in the wild.

Why Should You Care

If you use any of the affected software, your systems could be at risk. Imagine leaving your front door unlocked; anyone could walk in and take what they want. These vulnerabilities can give attackers the keys to your digital home, potentially compromising sensitive data or disrupting services. For businesses, this could mean financial loss, reputational damage, or legal repercussions.

It’s not just about the software you use; it’s about the trust your clients and users place in you. If a breach occurs, it could affect your relationships and your bottom line. Regularly updating your software and applying patches is like locking your doors and windows — it’s essential for keeping your digital assets secure.

What's Being Done

The Metasploit team is actively working on addressing these vulnerabilities. Here’s what you should do if you’re affected:

  • Update your software immediately to patch known vulnerabilities.
  • Monitor your systems for any unusual activity that could indicate an exploitation attempt.
  • Review your security policies to ensure they are up to date and effective.

Experts are keeping a close eye on these vulnerabilities, especially the ones being actively exploited in the wild. Expect further updates and guidance as more information becomes available.

💡 Tap dotted terms for explanations

🔒 Pro insight: The emergence of these exploits highlights the ongoing risk of zero-day vulnerabilities in widely used enterprise software.

Original article from

Rapid7 Blog · Christopher Granleese

Read Full Article

Related Pings

CRITICALVulnerabilities

Critical RRAS RCE Vulnerabilities Patched in Windows 11

Microsoft released a hotpatch for critical RRAS vulnerabilities in Windows 11. These flaws could allow hackers to execute code remotely. Users should ensure their systems are updated to protect against potential attacks.

Cyber Security News·
HIGHVulnerabilities

FortiGate Firewalls Targeted in High-Severity Exploit Wave

FortiGate firewalls are under attack as hackers exploit critical vulnerabilities. Organizations using these firewalls are at risk of credential theft and network breaches. Immediate patching and credential rotation are essential to mitigate these threats.

Cyber Security News·
HIGHVulnerabilities

March Patch Tuesday Fixes 84 Vulnerabilities Across 15 Products

Microsoft's March Patch Tuesday addressed 84 vulnerabilities across various products. Eight are critical, but none affect Windows directly. Stay updated to protect your systems from potential exploits.

Sophos News·
HIGHVulnerabilities

Microsoft Issues Urgent Hotpatch for Windows 11 RCE Vulnerability

Microsoft has released a critical hotpatch for Windows 11 to fix serious vulnerabilities. Affected devices include Windows 11 Enterprise systems. This update is crucial to prevent remote code execution that could compromise sensitive data.

BleepingComputer·
CRITICALVulnerabilities

Critical Vulnerability in HPE AOS-CX Allows Password Resets

The Flaw Hewlett Packard Enterprise (HPE) has reported a critical-severity vulnerability in its Aruba Networking AOS-CX switches, tracked as CVE-2026-23813. This vulnerability has a CVSS score of 9.8, indicating its severity. It allows attackers to reset administrator passwords remotely and without any authentication, effectively bypassing existing security measures. This flaw affects various models, including the CX 4100i, CX 6000,

SecurityWeek·
HIGHVulnerabilities

Critical LangSmith Vulnerability Exposes Users to Account Takeover

A critical vulnerability in LangSmith could allow hackers to take over user accounts. This flaw affects users who rely on LangSmith for AI data monitoring. Immediate action is required to ensure security and protect sensitive information.

Cyber Security News·