Signal
Older microsoft ConfigMgr bug now exploited as metasploit adds SolarWinds module
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-02-13 07:23 UTCUpdated 2026-02-13 20:01 UTC
rss
exploitation_in_the_wildpatchingsql_injectionmetasploitexploit_modulecve
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.2 top sources shown
limited source diversity in top sources
Overview
Reporting indicates attackers are now actively exploiting a SQL injection flaw in Microsoft Configuration Manager that was patched in October 2024, putting unpatched organizations at risk.
Entities
MicrosoftRapid7SolarWindsMetasploitMicrosoft Configuration ManagerSolarWinds Web Help Desk
Score total
0.96
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
- A 2024-patched Microsoft flaw is reported as now actively exploited
- Metasploit’s latest wrap-up documents new exploit module availability
- Both signals land in the same news cycle, reinforcing patch-and-verify priorities
Why it matters
- Active exploitation of an older, patched flaw increases urgency for lagging patch programs
- New Metasploit modules can speed validation and detection—but also enable faster attacker adoption
- SYSTEM-level outcomes raise potential impact if affected SolarWinds instances are exposed
LLM analysis
Topic mix: lowPromo risk: lowSource quality: medium
Recurring claims
- A Microsoft Configuration Manager SQL injection flaw patched in October 2024 is now being actively exploited, increasing risk for unpatched organizations.
- Metasploit added an exploit module for SolarWinds Web Help Desk vulnerabilities CVE-2025-40536 and CVE-2025-40551, with successful exploitation yielding an NT AUTHORITY\\SYSTEM session.
How sources frame it
- The Register Security: neutral
- Rapid7 Blog: neutral
All evidence
All evidence
Metasploit Wrap-Up 02/13/2026
Rapid7 Blog · rapid7.com · 2026-02-13 20:01 UTC
Attackers finally get around to exploiting critical Microsoft bug from 2024
The Register Security · go.theregister.com · 2026-02-13 18:45 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
- Rapid7 Blog (1)
- The Register Security (1)
Top origin domains (this list)
- rapid7.com (1)
- go.theregister.com (1)