CVE-2024-57727

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote...

Basic Information

CVE State
PUBLISHED
Reserved Date
January 09, 2025
Published Date
January 15, 2025
Last Updated
June 06, 2025
Vendor
n/a
Product
n/a
Description
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
Tags
cisa nuclei_scanner

CVSS Scores

CVSS v3.1

7.5 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-02-13 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2025-01-17 15:45:51 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2025-02-13 00:00:00 UTC

Recent Mentions

DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

Source: TheHackerNews • Published: 2025-05-29 10:34:00 UTC

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It's believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

imjdl/CVE-2024-57727

Type: github • Created: 2025-01-17 15:45:51 UTC • Stars: 12

CVE-2024-57727

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Added to KEVIntel

  • Detected by Nuclei