Researchers have disclosed three critical vulnerabilities in SimpleHelp, a widely-used remote support software. These vulnerabilities, identified as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726, pose severe risks, including unauthorized file access, privilege escalation, and remote code execution.
- CVE-2024-57727 allows attackers to download arbitrary files from a SimpleHelp server without authentication. Notably, configuration files containing password hashes, LDAP credentials, and API keys can be decrypted due to the use of hardcoded encryption keys.
- CVE-2024-57728 enables attackers with administrative privileges to upload malicious files to arbitrary locations on the server. This can result in the execution of remote commands through malicious cron jobs on Linux servers or the replacement of executable files on Windows servers, facilitating the launch of malware.
- CVE-2024-57726 stems from inadequate authorization in administrative functions. It allows low-privileged accounts to escalate their privileges to administrator level. Attackers can exploit this vulnerability to execute remote code by leveraging CVE-2024-57728.
The exploitation of these vulnerabilities can grant attackers full control over SimpleHelp servers, access to clients’ sensitive data, and the ability to deploy ransomware or other malicious software. These flaws are described as easy to exploit, significantly increasing the risk of cybercriminal abuse.
SimpleHelp has promptly released updates to address these vulnerabilities. Users are advised to update their software to versions 5.5.8, 5.4.10, or 5.3.9, change passwords, restrict administrative panel access by IP, and enable multi-factor authentication.
The vulnerabilities were discovered by researchers at Horizon3.ai and responsibly disclosed to SimpleHelp on January 6, 2025. Patches for affected versions were released on January 8 and January 13. Although there is no evidence of these vulnerabilities being exploited in the wild, experts urge immediate system updates to mitigate potential risks.
Remote support software like SimpleHelp is a frequent target for hackers due to its potential to grant access to entire networks. Similar tools have previously been exploited by hacking groups for espionage and ransomware deployment, highlighting the urgency of addressing identified vulnerabilities.
Delays in updating systems can result in data breaches, financial losses, and severe cybersecurity disruptions, particularly given the active exploitation of vulnerabilities in other popular remote access platforms. Swift action is essential to protect systems and maintain the integrity of sensitive information.