Loading HuntDB...

CVE-2024-57727

CRITICAL
Published 2025-01-15T00:00:00.000Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-57727. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.1
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.939
probability
of exploitation in the wild

There is a 93.9% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.999
Higher than 99.9% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Description

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.

Available Exploits

No exploits available for this CVE.

Related News

CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application

CVE-2024-57727 lets attackers read sensitive files via path traversal in SimpleHelp. Learn more about how attackers exploit this flaw. The post CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application appeared first on OffSec.

Offsec.com 2025-04-10 14:44
CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application

CVE-2024-57727 lets attackers read sensitive files via path traversal in SimpleHelp. Learn more about how attackers exploit this flaw. The post CVE-2024-57727: Path Traversal Vulnerability in SimpleHelp Web Application appeared first on OffSec.

Offsec.com 2025-04-10 14:44
CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-57727 SimpleHelp Path Traversal Vulnerability These types of vulnerabilities are frequent attack ve…

Cisa.gov 2025-02-13 12:00

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

March 6, 2025

Added to KEV

February 13, 2025

Required Action

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: SimpleHelp
Product: SimpleHelp

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.02.13 Released: February 13, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-x84r-h282-g729

Advisory Details

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Advisory provided by GitHub Security Advisory Database. Published: January 16, 2025, Modified: January 16, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

5 posts
Reddit 3 weeks, 1 day ago
hivesystems

Ransomware groups are exploiting SimpleHelp CVE-2024-57727. If you’re using it (or third-party tools that do), here’s what to check and our recommendations for how to manage it.

Reddit 1 month, 2 weeks ago
crstux

🔥 Top 10 Trending CVEs (15/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-43468](https://nvd.nist.gov/vuln/detail/CVE-2024-43468)** - 📝 Microsoft Configuration Manager Remote Code Execution Vulnerability - 📅 **Published:** 08/10/2024 - 📈 **CVSS:** 9.8 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 11 - ⚠️ **Priority:** 2 --- …

Reddit 1 month, 2 weeks ago
Dark-Marc
Exploit

CISA Alerts on SimpleHelp Ransomware Threat to Retail Sector **CISA has issued a warning about ransomware gangs exploiting a SimpleHelp vulnerability to target retail companies.** **Key Points:** - CISA identifies CVE-2024-57727 as a key vulnerability exploited by ransomware gangs. - The SimpleHelp software is used for remote access and has …

1
1
3.0
View Original High Risk
Reddit 1 month, 2 weeks ago
crstux

🔥 Top 10 Trending CVEs (14/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-24201](https://nvd.nist.gov/vuln/detail/CVE-2025-24201)** - 📝 An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, …

Reddit 1 month, 2 weeks ago
crstux

🔥 Top 10 Trending CVEs (13/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-32711](https://nvd.nist.gov/vuln/detail/CVE-2025-32711)** - 📝 M365 Copilot Information Disclosure Vulnerability - 📅 **Published:** 11/06/2025 - 📈 **CVSS:** 9.3 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C - 📣 **Mentions:** 14 - ⚠️ **Priority:** 2 --- **2. [CVE-2024-57727](https://nvd.nist.gov/vuln/detail/CVE-2024-57727)** …

References

Published: 2025-01-15T00:00:00.000Z
Last Modified: 2025-07-28T19:42:19.127Z
Copied to clipboard!