Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1190
(Exploit Public-Facing Application).
CVE Profile
CVE-2025-26399: 9.8 NVD Score
CISA KEV Status Active
CVE-2026-1603: 8.6 NVD Score
CISA KEV Status Active
CVE-2021-22054: 7.5 NVD Score
CISA KEV Status Active
Telemetry
Target applications identified
SolarWinds Web Help Desk, Workspace One UEM, and Ivanti Endpoint Manager.
Target components identified
The "AjaxProxy" component of SolarWinds is specifically targeted by CVE-2025-26399.
Threat Actor tracking
Activity tied to CVE-2025-26399 is believed to be the work of the Warlock ransomware crew.
Constraint
The structure suggests network-based Remote Code Execution (RCE) and Server-Side Request Forgery (SSRF) payloads, but explicit binary chain-of-custody is not provided in the current telemetry.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Federal Civilian Executive Branch (FCEB) agencies must apply the fix for SolarWinds Web Help Desk by March 12, 2026.
Command
FCEB agencies must apply the fixes for Ivanti and Workspace One by March 23, 2026.
DETECT (DE) – Monitoring & Analysis
Command
Deploy SIEM queries for unusual deserialization anomalies or SSRF patterns targeting the "AjaxProxy" application path or UEM network requests.
RESPOND (RS) – Mitigation & Containment
Command
Isolate unpatched SolarWinds Help Desk, Ivanti EPM, and Workspace One UEM instances from the internet immediately to disrupt unauthorized requests and credential leaks.
RECOVER (RC) – Restoration & Trust
Command
Validate integrity of stored credentials exposed by CVE-2026-1603 before restoring Ivanti services to production.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Audit public-facing perimeter for shadow IT running end-of-life or unpatched network management software to reduce the external attack surface.
Remediation - THE HOME USER TRACK (Safety Focus)
Constraint Applied
Environmental Reality Check confirms the affected software is strictly enterprise-grade. The Threat Level for standard home environments is
Theoretical/Low. Emergency disconnection is not required unless manually hosting these IT platforms.
Priority 1: Safety
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions.
Hardening & References
Baseline
CIS Benchmarks for Enterprise Web Server and Edge Device Security.
Framework
NIST CSF 2.0 / SP 800-61r3.
CISA Directive
KEV Catalog Addition (March 2026).
Source
The Hacker News
CISA KEV Catalog