CVE-2024-57727

Published Jan 15, 2025

Last updated 14 days ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-57727 is a path traversal vulnerability in SimpleHelp remote support software, affecting versions 5.5.7 and older. This flaw allows unauthenticated attackers to download arbitrary files from SimpleHelp servers via specially crafted HTTP requests. The types of files that could be accessed include server configuration files and potentially hashed passwords. This vulnerability, when combined with CVE-2024-57728 and CVE-2024-57726, can lead to full system compromise. Exploitation of this vulnerability chain has been observed in the wild, with threat actors using it to gain initial access to systems. It's recommended to update SimpleHelp to the latest version or uninstall it if no longer needed.

Description
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
SimpleHelp Path Traversal Vulnerability
Exploit added on
Feb 13, 2025
Exploit action due
Mar 6, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-22
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-22

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    26 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  2. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    25 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  3. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    24 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    23 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    22 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    22 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    21 Feb 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Comment: CVE-2024-57727 sounds like the gift that keeps on giving. I’m sure those configuration files contain *all* kinds of helpful info for threat actors to personalize their attacks. It’... #Ransomware https://t.co/7rzsG7uUrx

    @storagetechnews

    19 Feb 2025

    23 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  9. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    19 Feb 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  10. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    19 Feb 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. Last week, @CISAgov added #SimpleHelp CVE-2024-57727 to the KEV: https://t.co/z1vVIUTsvF. ➡️ This vulnerability has been available as a Rapid Response test in #NodeZero for over a month, giving users plenty of time to patch their systems. Don't wait for malicious actors to… http

    @Horizon3ai

    18 Feb 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    18 Feb 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    17 Feb 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    16 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    15 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. CVE-2024-57726., CVE-2024-57727., CVE-2024-57728. Enterprise egg-shell

    @byt3n33dl3

    15 Feb 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    15 Feb 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  18. PostgreSQL & BeyondTrust Zero-Day Exploited in Targeted Attacks! Hackers abused a PostgreSQL flaw (CVE-2025-1094, CVSS 8.1) & a BeyondTrust zero-day for unauth RCE. ⚠️ PostgreSQL patched it—update now! CISA mandates fixes for SimpleHelp CVE-2024-57727 by March 6.… https

    @dCypherIO

    14 Feb 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. Actively exploited CVE : CVE-2024-57727

    @transilienceai

    14 Feb 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. CISA が既知の悪用された脆弱性をカタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Feb 13) ー CVE-2024-57727 SimpleHelp パストラバーサル脆弱性 https://t.co/4gkUNCFk8y

    @foxbook

    13 Feb 2025

    83 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. 🛡️ We added SimpleHelp path traversal vulnerability CVE-2024-57727 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t.co/c1g92wj7z5

    @CISACyber

    13 Feb 2025

    5012 Impressions

    10 Retweets

    23 Likes

    2 Bookmarks

    2 Replies

    4 Quotes

  22. Vulnerabilidades de SimpleHelp RMM (CVE-2024-57726, CVE-2024-57727 y CVE-2024-57728) señaladas por Arctic permiten implementar puertas traseras y crear cuentas para obtener control administrativo, instalar puertas traseras y eventualmente desplegar ransomware. 🧉 https://t.co/Uq

    @MarquisioX

    11 Feb 2025

    35 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  23. Threat actors exploit newly disclosed vulnerabilities in SimpleHelp's Remote Monitoring and Management (RMM) software to gain unauthorized access and lay the groundwork for ransomware attacks. These vulnerabilities (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728) https://t.co

    @smart_c_intel

    10 Feb 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  24. Hackers are targeting vulnerable SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. The flaws are tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728. https://t.co/gg6fqRHwqF https://t.co/y

    @riskigy

    9 Feb 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Hackers are exploiting vulnerabilities in SimpleHelp RMM, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, to breach corporate networks. Attackers create unauthorized admin accounts, install backdoors, and may prepare for ransomware attacks. Evidence suggests links…

    @y1659rsgh

    8 Feb 2025

    4 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. SimpleHelp RMM flaws exploited to breach corporate networks: https://t.co/dzrUnoyfkC Hackers are exploiting vulnerabilities in SimpleHelp RMM, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, to breach corporate networks. Attackers create unauthorized admin… https:

    @securityRSS

    7 Feb 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨 URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware. CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution. https://t.co/pHaiAm

    @SamTechwest

    7 Feb 2025

    68 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Hackers are exploiting vulnerabilities in SimpleHelp RMM (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728) for ransomware attacks. Organizations must update their software to reduce risk. 🛡️💻 #RMM #Ransomware #USA link: https://t.co/iIX2aGlrYX https://t.co/i81hVkLDco

    @TweetThreatNews

    7 Feb 2025

    17 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🚨 URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware. CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution. 👉 Secure your… ht

    @TheHackersNews

    7 Feb 2025

    46405 Impressions

    47 Retweets

    134 Likes

    16 Bookmarks

    3 Replies

    3 Quotes

  30. Top 5 Trending CVEs: 1 - CVE-2025-21298 2 - CVE-2025-24118 3 - CVE-2024-57727 4 - CVE-2025-24883 5 - CVE-2025-21293 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    1 Feb 2025

    120 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. ⚠️PSA: Curated Intel members in DFIR have noticed a trend in exploitation of CVE-2024-57727 in the SimpleHelp RMM tool to deploy Medusa ransomware. ➡️ This tool is often used by IT Managed Service Providers (MSPs) to remotely control customer endpoints and have been impacted.

    @CuratedIntel

    31 Jan 2025

    3443 Impressions

    19 Retweets

    39 Likes

    9 Bookmarks

    2 Replies

    0 Quotes

  32. Уязвимости в SimpleHelp Remote Monitoring and Management (RMM), такие как CVE-2024-57726, CVE-2024-57727 и CVE-2024-57728, позволяют злоумышленникам загружать и выгружать файлы, а также повышать привилегии до уровня администратора. Подробнее https://t.co/TrPw17sEP7 https://t.co/D

    @KZCERT

    30 Jan 2025

    73 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. From @AWNetworks: A campaign has been observed involving unauthorized access to devices running #SimpleHelp RMM software as an initial access vector. This came just a week after we publicly disclosed CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728 in SimpleHelp. For the full

    @Horizon3ai

    29 Jan 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Update: Critical vulnerabilities in #SimpleHelp are now being exploited (#CVE-2024-57727, #CVE-2024-57728, #CVE-2024-57726); These can lead to info disclosure, privilege escalation, and RCE. Patch and advisory are available at: https://https://t.co/UlONgZAyDI #Patch #Patch #Patch

    @CCBalert

    29 Jan 2025

    247 Impressions

    2 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Hackers exploiting flaws in SimpleHelp RMM to breach networks. The flaws, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, allow threat actors to download and upload files on devices and escalate privileges to administrative levels. https://t.co/knnGrF94Qo https://

    @riskigy

    29 Jan 2025

    50 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. Researchers warn of a cyberattack exploiting SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing unauthorized device access. Ensure software is updated! 🔒💻 #SimpleHelp #CyberThreats #USA link: https://t.co/wdljUdasgh https://t.co/s1hk2hVJO

    @TweetThreatNews

    28 Jan 2025

    42 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  37. Researchers have identified critical vulnerabilities in **SimpleHelp remote access software** that could enable information disclosure, privilege escalation, and remote code execution. The flaws include: - **CVE-2024-57727**: Allows unauthenticated attackers to download https:

    @smart_c_intel

    20 Jan 2025

    51 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  38. Warning: Critical vulnerabilities in SimpleHelp remote access software (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) can lead to info disclosure, privilege escalation, and RCE. Patch and advisory are available at: https://t.co/HhQIqSK040 #Patch #Patch #Patch

    @CCBalert

    16 Jan 2025

    161 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. CVE-2024-57727 Unauthenticated Path Traversal in SimpleHelp Leads to Data Exposure https://t.co/guVZrUYeOs

    @VulmonFeeds

    16 Jan 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. 🚨Alert🚨 CVE-2024-57727&&CVE-2024-57728&&CVE-2024-57726 : Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks 📊 75k+ Services are found on https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/LxDmNVsdm9 👇Query HUNTER… https:/

    @HunterMapping

    16 Jan 2025

    1336 Impressions

    3 Retweets

    17 Likes

    6 Bookmarks

    0 Replies

    0 Quotes

  41. 🚨 New from @Horizon3Attack: Three critical vulnerabilities have been disclosed in #SimpleHelp remote support software, which could enable an attacker with no prior privileges to compromise a SimpleHelp server and client machines managed by SimpleHelp. 🔺 CVE-2024-57727:… https

    @Horizon3ai

    15 Jan 2025

    204 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. We disclosed a few vulns last week affecting SimpleHelp's remote support software: ♦️ CVE-2024-57726: Priv esc to admin ♦️ CVE-2024-57727: Unauth arbitrary file download ♦️ CVE-2024-57728: Admin RCE via arbitrary file upload Together these vulns could enable an attacker with…

    @Horizon3Attack

    15 Jan 2025

    6709 Impressions

    20 Retweets

    74 Likes

    24 Bookmarks

    0 Replies

    0 Quotes

Configurations