CVE ID
CVE-2024-57727
Vulnerability Name
SimpleHelp Path Traversal Vulnerability
- Project: *SimpleHelp *
- Product: SimpleHelp
Date
- Date Added: 2025-02-13
- Due Date: 2025-03-06
Description
SimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.
Known To Be Used in Ransomware Campaigns?
Known
Action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Additional Notes
https://simple-help.com/kb---security-vulnerabilities-01-2025 ; Additional CISA Mitigation Instructions: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a ; https://nvd.nist.gov/vuln/detail/CVE-2024-57727
Related Security News
- China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
- Microsoft links Medusa ransomware affiliate to zero-day attacks
- Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
- Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
- FBI: Play ransomware breached 900 victims, including critical orgs
- DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
- Attackers hit MSP, use its RMM software to deliver ransomware to clients
- DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
- DragonForce ransomware abuses MSP’s SimpleHelp RMM to encrypt customers
- PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
Top comments (0)