The cybersecurity firm Horizon3.ai has revealed critical vulnerabilities in the SimpleHelp remote access software, highlighting significant risks to both server and client machines. SimpleHelp, a popular tool used by technicians for remote system diagnosis, file transfers, and task automation, relies on an infrastructure involving administrators, technicians, and customers. However, Horizon3.ai's analysis uncovered serious flaws that compromise this setup. One vulnerability, tracked as CVE-2024-57727, is a path traversal flaw that allows unauthenticated attackers to access sensitive files on the SimpleHelp server. These files include logs, configuration details, and encrypted credentials such as LDAP passwords and API keys. With a CVSS score of 7.5, this vulnerability poses a substantial risk of unauthorized access to critical server secrets. Another flaw, CVE-2024-57728, has a CVSS score of 7.2 and allows attackers with administrator or technician privileges to upload arbitrary files to the server. If exploited, this could lead to remote code execution, particularly on Linux targets. On Windows-based systems, attackers could overwrite executable files or libraries within SimpleHelp, potentially gaining control of the server. This vulnerability also endangers customer machines, especially those with unattended access enabled, which allows technicians to control systems without user interaction. The most severe issue, CVE-2024-57726, carries a CVSS score of 9.9 and enables low-privilege technicians to escalate their access to administrator-level privileges. This flaw stems from missing authorization checks in certain backend functions, allowing attackers to craft network requests to gain elevated rights. Once admin access is obtained, attackers could exploit other vulnerabilities, such as arbitrary file uploads, to fully compromise the server. All these vulnerabilities have been addressed in SimpleHelp updates, with patched versions 5.5.8, 5.4.10, and 5.3.9 released in early January 2025. Users are strongly advised to update their installations and reset passwords to prevent potential exploitation.
There has been a critical security hole in NGINX, which has been widely reported since the publication of an exploit to demonstrate the potential for remote code execution. The vul...
Security analysts uncovered a sophisticated intrusion campaign centered on TencShell, a modified variant of the open source Rshell command and control framework. The malware target...
Microsoft has introduced a new AI-powered cybersecurity platform called MDASH, short for Multi-Model Agentic Scanning Harness, to enhance vulnerability identification and remediati...