Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Dozens of SysAid Instances Vulnerable to Remote Hacking

Posted on May 8, 2025May 8, 2025 By CWS

Updates launched not too long ago by SysAid for its IT service administration (ITSM) software program patch vulnerabilities that may be chained for unauthenticated distant command execution.

Particulars of the vulnerabilities have been disclosed on Wednesday by safety agency WatchTowr. The corporate’s researchers found a number of XXE vulnerabilities that could possibly be exploited by unauthenticated attackers utilizing specifically crafted requests.

They permit hackers to acquire native information containing delicate info (together with for full admin entry to SysAid), entry different methods on the community, and trigger a DoS situation. 

Nevertheless, WatchTowr researchers have been unable to attain distant command execution till they seen that the SysAid replace containing fixes for his or her vulnerabilities additionally patched an authenticated OS command injection subject found by an unnamed particular person. 

An evaluation of the patch for the command injection bug revealed that it may certainly be chained with one in all their XXE flaws for unauthenticated distant command execution. 

The XXE flaws are tracked as CVE-2025-2775, CVE-2025-2776 and CVE-2025-2777, whereas the OS command injection subject is tracked as CVE-2025-2778.

SysAid patched the vulnerabilities with the discharge of model 24.4.60 in early March. Variations 23.3.40 and earlier are impacted.

WatchTowr identified that the vulnerability disclosure didn’t go as easily because it had hoped, claiming that the seller solely responded as soon as firstly of the method. SecurityWeek has reached out to SysAid for remark and can replace this text if the corporate responds.Commercial. Scroll to proceed studying.

The Shadowserver Basis reported on Wednesday that it had recognized 77 internet-exposed SysAid situations that gave the impression to be unpatched. 

WatchTowr has revealed a proof-of-concept (PoC) exploit that can be utilized for unauthenticated distant command execution.

It’s necessary that organizations deal with these vulnerabilities as menace actors focusing on SysAid situations isn’t extraordinary. In recent times, SysAid product vulnerabilities have been focused by each state-sponsored hackers and cybercrime teams. 

SysAid says its ITSM merchandise are utilized by 10 million customers throughout 140 international locations. 

Associated: Halo ITSM Vulnerability Uncovered Organizations to Distant Hacking

Associated: Ivanti Patches Important Vulnerabilities in Neurons for ITSM, Digital Site visitors Supervisor

Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day

Security Week News Tags:Dozens, Hacking, Instances, Remote, SysAid, Vulnerable

Post navigation

Previous Post: Masimo Manufacturing Facilities Hit by Cyberattack
Next Post: Cisco Patches 35 Vulnerabilities Across Several Products

Related Posts

BlackSuit Ransomware Group Transitioning to ‘Chaos’ Amid Leak Site Seizure Security Week News
ThreatSpike Raises $14 Million in Series A Funding Security Week News
Cato Networks Raises $359 Million to Expand SASE Business Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News