SolarWinds threat watch

SolarWinds CVE coverage for IT operations, monitoring, service management, file-transfer, and MSP-adjacent tooling.

Vendor watch hub

What this page covers

The SolarWindswatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent SolarWinds activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

10

Active

10

Featured

10

Unique CVEs

10

Most recent entry

Mar 8, 2026, 7:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent SolarWinds watch items

Showing the 10 most recent items, newest first. Each row links to the official advisory.

10 rows · sorted newest first

Operations view

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2025-26399

SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.

Mar 8, 2026, 7:00 PMOfficial source

SolarWinds Web Help Desk Security Control Bypass Vulnerability

critical
activeCISA KEVCVE-2025-40536

SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.

Feb 11, 2026, 6:00 PMOfficial source

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2025-40551

SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Feb 2, 2026, 6:00 PMOfficial source

SolarWinds Web Help Desk Hardcoded Credential Vulnerability

critical
activeCISA KEVCVE-2024-28987

SolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.

Oct 14, 2024, 7:00 PMOfficial source

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2024-28986

SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.

Aug 14, 2024, 7:00 PMOfficial source

SolarWinds Serv-U Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-28995

SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.

Jul 16, 2024, 7:00 PMOfficial source

SolarWinds Serv-U Improper Input Validation Vulnerability

critical
activeCISA KEVCVE-2021-35247

SolarWinds Serv-U versions 15.2.5 and earlier contain an improper input validation vulnerability that allows attackers to build and send queries without sanitization.

Jan 20, 2022, 6:00 PMOfficial source

SolarWinds Serv-U Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2021-35211

SolarWinds Serv-U contains an unspecified memory escape vulnerability which can allow for remote code execution. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

SolarWinds Orion Authentication Bypass Vulnerability

critical
activeCISA KEVCVE-2020-10148

SolarWinds Orion API contains an authentication bypass vulnerability that could allow a remote attacker to execute API commands.

Nov 2, 2021, 7:00 PMOfficial source

virtualization manager vulnerability (CVE-2016-3643)

HIGH
activeCISA KEVCVE-2016-3643

SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by "sudo cat /etc/passwd."

Jun 17, 2016, 10:59 AMOfficial source

Related vendors

Other security vendors in the radar

Vendor watch FAQ

Common questions

What is the SolarWinds threat watch page?

It is the SolarWinds-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the SolarWinds watch page?

Use it to confirm whether current SolarWinds issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to SolarWinds security issues?

Yes. ITECS can help map SolarWinds advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.