AKLWEB HOST LLC
 
Some Systems Are Experiencing Issues

AKLWEB HOST LLC Status System

Welcome to the AKLWEB HOST LLC Status website. Here, you can view the status of all AKLWEB HOST LLC services across all products and availability zones (AZs).

Current Incidents

Thursday 30th April 2026

cPanel Hosting Server Node - 1 Critical Authentication Vulnerability on cPanel/WHM

We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.

More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.

Impact:

-Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel.

-No impact to hosted websites, applications, email or services.

We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.

No additional action is required at this time. We will provide additional updates to this status page as more information is made available.

  • Monitoring: cPanel Patches Deployment Completed

    We are currently monitoring the situation to ensure full service stability. We appreciate your patience and will provide a final update once everything is confirmed to be operating normally.

  • Update: cPanel Patches Deployed

    cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access.

    For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections.

    We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment.

    We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.

  • Update: cPanel Patch Deployment Underway

    cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.

    Once the patch is successfully applied, we will take the following actions:

    Remove the network-level firewall blocks:

    cPanel: 2082 / 2083

    WHM: 2086 / 2087

    Webmail: 2095 / 2096

    Web Disk: 2077 / 2078

    More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

    We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.

  • Update: cPanel Company Review

    cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.

    Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.

    Temporary changes being implemented:

    -Blocking access to ports related to cPanel services.

    WHM: 2082 / 2083

    cPanel: 2086 / 2087

    Webmail: 2096 / 2097

    Web Disk: 2077 / 2078

    -Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.

    These changes do not impact websites, email delivery, databases, or Apache functionality.

    These temporary restrictions will be reverted as soon as cPanel releases a patch addressing the critical vulnerabilities.

    Additional information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication

    If you have further questions or need assistance, please contact our Support team.

  • Past Incidents

    Wednesday 18th February 2026

    DC7-569 - Datacenters POP3 and SSH Service Down Alerts on Multiple Servers

    We are currently investigating the POP3 and SSH service down alerts on a subset of servers. The issue appears to have occurred after an endpoint update on the Mbdaemon associated with the Threatdown add-on service.

    Our engineering team is actively working to identify the root cause and resolve the issue.

    If you need assistance, please chat with us or submit a ticket at Submit A Support Ticket. Thank you for your patience and understanding. We appreciate your support.

  • This incident has been resolved. We have successfully mitigated the impact caused by the ThreatDown update and are observing stability across our fleet.

    If you have ThreatDown installed and continue to experience issues—such as your server being unresponsive or down—please reboot your server via the management portal at Submit A Support Ticket and reach out to our support team for further assistance.

  • We are continuing to see stability across the fleet and have not observed any recent alerts related to this issue. Our team has been actively working on this incident to apply the fix across the affected servers, and we have made solid progress so far, with completion on the impacted list.

    We are actively monitoring the situation and will keep this space updated as soon as we have further information available.

    If you believe your system may be affected or require assistance, please chat with us or submit a ticket at Submit A Support Ticket.

    Thank you for your understanding and patience!

  • We are making steady progress by implementing necessary fixes and working closely with ThreatDown to find a lasting solution. The systems are stabilizing, and we are in good shape to manage the situation.

    We will continue to monitor the situation and share further updates as they become available. Please contact support if you experience any issues. Thank you for your patience.

  • At this time, we have downgraded the severity of this incident. Our teams remain actively engaged and continue to monitor the affected systems. Any new issues will be addressed by applying the mblinux-updater-fix, followed by a server reboot as needed. We are also continuing to work closely with ThreatDown support toward a permanent resolution.

    If you experience any service interruptions, please don’t hesitate to reach out via chat or submit a support ticket through your customer portal at Submit A Support Ticket. We appreciate your patience and understanding as our teams work through this, and we’ll provide further updates as they become available.

  • Our team is actively working to resolve the issue by running the mblinux-updater-fix, which has proven effective when combined with a server reboot. Based on ongoing service alerts, we are applying this fix where required and closely monitoring affected systems to ensure stability.

    We are actively working with ThreatDown to identify the best permanent resolution and outline next steps. If you believe your system may still be affected or you experience any service interruption, please contact us via chat or submit a support ticket at Submit A Support Ticket.

    Further updates will be provided as they become available.

  • Our team has made progress by applying the fix to the affected servers. We have been working closely with the ThreatDown team to obtain the latest updates from their side in order to address this issue. We will continue to monitor the situation and take action where necessary.

    If you believe your system may be affected or you are experiencing a service interruption, please contact us via chat or submit a support ticket at Submit A Support Ticket.

    We will provide further updates as they become available.

    Thank you for your patience and support.

  • We have identified the issue and confirmed it impacts a subset of services with the ThreatDown (TD) add-on enabled. WE have additional resources engaged with Threat Stack. Our team is working through and applying manual fixes to servers that we have been able to identify as affected by this incident.

    We’ll provide additional updates as they become available.

    If you believe your system is impacted or are experiencing a service interruption, please chat with us or submit a ticket at Submit A Support Ticket.

    Thank you for your patience and support.

  • Our team is actively addressing impacted systems and working to restore service as quickly as possible.

    If you believe your system is affected or need assistance, please chat with us or submit a ticket at Submit A Support Ticket.

    Thank you for your patience and support.

  • We’ve identified the issue and confirmed it impacts a subset of services with the ThreatDown (TD) add-on enabled. Our team is actively identifying affected systems and deploying a fix as quickly as possible.

    We’ll provide additional updates as they become available.

    If you believe your system is impacted or are experiencing a service interruption, please chat with us or submit a ticket at Submit A Support Ticket.

    Thank you for your patience and support.

  • The issue has been identified and is affecting only services with the ThreatDown (TD) add-on enabled. Our Support team is actively working to implement a fix as quickly as possible.

    We appreciate your patience and understanding. Further updates will be shared here as they become available.

    If you need assistance, please chat with us or submit a ticket at Submit A Support Ticket. Thank you for your patience and understanding. We appreciate your support.

  • The issue has been identified, and our Support team is actively working to implement the fix as quickly as possible.

    We appreciate your patience and understanding. Further updates will be shared here as they become available.

  • Tuesday 17th February 2026

    No incidents reported

    Monday 16th February 2026

    No incidents reported

    Sunday 15th February 2026

    DC7-569 - Datacenters Issue Deploying New Servers Within [DC - 7] - [DC7-569] Data Center

    We are investigating a networking issue that is preventing new server deployments within our [DC - 7] - [DC7-569] Data Center. Existing customer servers are not impacted.

    Need help? Chat with us or create a ticket via Submit A Support Ticket.

    We appreciate your patience and understanding as we work to restore this service. Thank you.

  • This incident has been resolved.

  • A fix has been implemented and we are monitoring the results.

  • Saturday 14th February 2026

    No incidents reported

    Friday 13th February 2026

    No incidents reported

    Thursday 12th February 2026

    DC4-092 - Datacenters [DC - 5] - [DC4-092] Power Issue In A Rack

    A power feed is down in one of our rack, causing some servers in the affected rack to shut down.

    This impact the availability of some DC - 5 instances in the DC4-092 rack.

  • This incident has been resolved.

  • A fix has been implemented and we are monitoring the results.

  • Power has been restored, all DC4-092 Instances should now be up.

    We are monitoring the situation.

  • Wednesday 11th February 2026

    cPanel Hosting Server Node - 1 Emergency Maintenance - Router Chassis Reboot

    The router in [NY1] - [DC4-092] will be power cycled to fully resolve firmware related issues identified in a prior network event. While the maintenance window is set for 5 hours, we only expect roughly 15 - 20 minutes of network unavailability during this time. Additional time is taken into account in case of unexpected issues. We recommend planning for the entire maintenance window, again, we only expect 15 - 20 minutes of network unavailability.

    If you have any questions regarding this notice, please contact us at https://www.aklwebhost.com/submitticket.php?step=2&deptid=2.

  • This incident has been resolved.

  • The fix has been implemented in router firmware. As of now, we are watching the results.

  • Copyright © 2026 AKLWEB HOST LLC. All Rights Reserved.