Remote access tools are highly valued targets for cybercriminals because they provide direct pathways into corporate networks.
When compromised, these platforms allow threat actors to bypass traditional security perimeters and launch devastating secondary attacks.
Organizations using SimpleHelp must take immediate action to secure their infrastructure against potential compromise.
The first critical vulnerability, CVE-2024-57726, is classified as a missing authorization issue under CWE-862.
This security gap fundamentally breaks the role-based access controls within the SimpleHelp platform.
The flaw allows low-privileged technicians to bypass intended restrictions and generate API keys with excessive permissions.
By exploiting this weakness, a compromised low-level account can quickly escalate privileges to the server administrator role.
Gaining this level of access gives attackers complete administrative control over the remote support environment and all connected client machines.
The second vulnerability, CVE-2024-57728, is a dangerous path traversal flaw linked to CWE-22.
Often referred to as a “zip slip” attack, this exploit allows an authenticated administrator to upload specially crafted zip files anywhere on the underlying file system.
Although an attacker needs admin access to trigger this bug, they can easily chain it with the first authorization vulnerability to gain the required permissions.
Once the malicious payload is uploaded, threat actors can execute arbitrary code on the host server.
This code runs within the security context of the SimpleHelp user, giving hackers a firm foothold for lateral movement across the network.
On April 24, 2026, CISA officially added these security flaws to its Known Exploited Vulnerabilities (KEV) catalog.
Due to the active exploitation of these flaws, CISA has established a strict remediation deadline of May 8, 2026.
While it is currently unknown whether ransomware gangs are using these specific exploits, the threat’s severity requires immediate attention.
Security teams must prioritize patching and securing their remote access infrastructure to prevent unauthorized system takeovers.
System administrators should implement the following security measures immediately:
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack appeared first on Cyber Security News.
PhantomRPC, a newly identified architectural vulnerability in Windows Remote Procedure Call (RPC) that enables local…
It seems a return to Star Wars could be in the cards for Gina Carano…
A new weekend has arrived, and today, you can save big on Apple AirTags, 4K…
Tension: We cling to life plans that stopped working years ago, unable to admit the…
Tension: We cling to life plans that stopped working years ago, unable to admit the…
Tension: Introverts experience loneliness not from isolation but from shallow connections that drain rather than…
This website uses cookies.