New Exploits Unleashed for SolarWinds and FreeBSD!
Basically, new security flaws in software let hackers take control of systems.
Metasploit has released new exploits for SolarWinds and FreeBSD vulnerabilities. These flaws could allow hackers to seize control of systems. Immediate software updates are crucial to protect your data and services.
What Happened
In a significant update, the Metasploit team has rolled out new exploit modules targeting vulnerabilities in popular software, including SolarWinds and FreeBSD. These vulnerabilities could allow attackers to gain unauthorized access and control over systems. Notably, the SolarWinds Web Help Desk vulnerabilities, tracked as CVE-2025-40536? and CVE-2025-40551, can let an attacker operate with the highest system privileges.
The update introduces several new exploits, including a command injection? vulnerability in FreeBSD's rtsol/rtsold daemons (CVE-2025-14558). This flaw allows attackers to execute commands as root, which can lead to severe consequences for affected systems. Additionally, a recently discovered unauthenticated? remote code execution (RCE?) vulnerability in Ivanti Endpoint Manager Mobile (CVE-2026-1340) is also part of this release, which has already been exploited in the wild.
Why Should You Care
If you use any of the affected software, your systems could be at risk. Imagine leaving your front door unlocked; anyone could walk in and take what they want. These vulnerabilities can give attackers the keys to your digital home, potentially compromising sensitive data or disrupting services. For businesses, this could mean financial loss, reputational damage, or legal repercussions.
It’s not just about the software you use; it’s about the trust your clients and users place in you. If a breach occurs, it could affect your relationships and your bottom line. Regularly updating your software and applying patches is like locking your doors and windows — it’s essential for keeping your digital assets secure.
What's Being Done
The Metasploit team is actively working on addressing these vulnerabilities. Here’s what you should do if you’re affected:
- Update your software immediately to patch known vulnerabilities.
- Monitor your systems for any unusual activity that could indicate an exploitation attempt.
- Review your security policies to ensure they are up to date and effective.
Experts are keeping a close eye on these vulnerabilities, especially the ones being actively exploited in the wild. Expect further updates and guidance as more information becomes available.
Rapid7 Blog