
Welcome to the AKLWEB HOST LLC Status website. Here, you can view the status of all AKLWEB HOST LLC services across all products and availability zones (AZs).
We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.
More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.
Impact:
-Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel.
-No impact to hosted websites, applications, email or services.
We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.
No additional action is required at this time. We will provide additional updates to this status page as more information is made available.
Update: cPanel Patches Deployed
cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access.
For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections.
We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment.
We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.
Update: cPanel Patch Deployment Underway
cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.
Once the patch is successfully applied, we will take the following actions:
Remove the network-level firewall blocks:
cPanel: 2082 / 2083
WHM: 2086 / 2087
Webmail: 2095 / 2096
Web Disk: 2077 / 2078
More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Update: cPanel Company Review
cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.
Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.
Temporary changes being implemented:
-Blocking access to ports related to cPanel services.
WHM: 2082 / 2083
cPanel: 2086 / 2087
Webmail: 2096 / 2097
Web Disk: 2077 / 2078
-Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.
These changes do not impact websites, email delivery, databases, or Apache functionality.
These temporary restrictions will be reverted as soon as cPanel releases a patch addressing the critical vulnerabilities.
Additional information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
If you have further questions or need assistance, please contact our Support team.
No incidents reported
No incidents reported
No incidents reported
No incidents reported
No incidents reported
No incidents reported
We are actively responding to a critical vulnerability affecting all versions of cPanel & WHM. This vulnerability impacts the authentication process and could allow unauthorized access if left unmitigated.
More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
Our team is working alongside vendor guidance and implementing proactive safeguards to protect environments. As an immediate precaution, we have temporarily restricted access to cPanel/WHM interfaces on the following ports 2082, 2083, 2086, and 2087. Restricted access will remain in place until a patch is developed and deployed. This action is being taken to prevent potential unauthorized access while a permanent fix is finalized.
Impact:
-Restricting access to cPanel/WHM Ports via a network firewall block. During this time customers will not be able to login to either WHM or cPanel.
-No impact to hosted websites, applications, email or services.
We are closely monitoring the official patch release from cPanel and will deploy it as quickly as possible. Once mitigations are no longer required, normal access will be restored.
No additional action is required at this time. We will provide additional updates to this status page as more information is made available.
Update: cPanel Patches Deployed
cPanel patches have been deployed across all eligible servers. As mitigation measures are now in place for the majority of systems, we have lifted the temporary network-level blocks that were implemented to prevent unauthorized access.
For servers ineligible for the patch, we are applying temporary protections at the server level using CSF. As part of this step, CSF rules are being implemented to restrict access to the affected ports. This approach allows access to be controlled by whitelisting trusted client IP addresses while maintaining appropriate security protections.
We strongly recommend that all customers update to the latest version of cPanel & WHM as soon as possible to ensure full protection against this vulnerability. For servers not eligible for the patch, we will be reaching out shortly with guidance on what options are available to secure your environment.
We will continue to closely monitor the situation and take any additional steps necessary to maintain system security and stability. If you need assistance with updating cPanel or have any concerns, please contact our Support team.
Update: cPanel Patch Deployment Underway
cPanel has released a patch to address the authentication vulnerability that was identified today. Our engineers are currently working on deploying this patch across eligible cPanel services.
Once the patch is successfully applied, we will take the following actions:
Remove the network-level firewall blocks:
cPanel: 2082 / 2083
WHM: 2086 / 2087
Webmail: 2095 / 2096
Web Disk: 2077 / 2078
More information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
We appreciate your continued patience as we complete these actions to restore full service. If you have any questions in the meantime, please contact us for assistance.
Update: cPanel Company Review
cPanel has disclosed that the additional cPanel-provided services Webmail and Web Disk are impacted by this vulnerability.
Out of an abundance of caution, and based on cPanel’s current recommendation, we are implementing temporary protective changes on servers hosted on our network.
Temporary changes being implemented:
-Blocking access to ports related to cPanel services.
WHM: 2082 / 2083
cPanel: 2086 / 2087
Webmail: 2096 / 2097
Web Disk: 2077 / 2078
-Temporarily disabling cpsrvd, which is the web wrapper for cPanel web services.As a result, cPanel, WHM, Webmail, Web Disk, and related cPanel services will be inaccessible, including over Cloud VPN connections.
These changes do not impact websites, email delivery, databases, or Apache functionality.
These temporary restrictions will be reverted as soon as cPanel releases a patch addressing the critical vulnerabilities.
Additional information from cPanel is available here: https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication
If you have further questions or need assistance, please contact our Support team.