Updates launched not too long ago by SysAid for its IT service administration (ITSM) software program patch vulnerabilities that may be chained for unauthenticated distant command execution.
Particulars of the vulnerabilities have been disclosed on Wednesday by safety agency WatchTowr. The corporate’s researchers found a number of XXE vulnerabilities that could possibly be exploited by unauthenticated attackers utilizing specifically crafted requests.
They permit hackers to acquire native information containing delicate info (together with for full admin entry to SysAid), entry different methods on the community, and trigger a DoS situation.
Nevertheless, WatchTowr researchers have been unable to attain distant command execution till they seen that the SysAid replace containing fixes for his or her vulnerabilities additionally patched an authenticated OS command injection subject found by an unnamed particular person.
An evaluation of the patch for the command injection bug revealed that it may certainly be chained with one in all their XXE flaws for unauthenticated distant command execution.
The XXE flaws are tracked as CVE-2025-2775, CVE-2025-2776 and CVE-2025-2777, whereas the OS command injection subject is tracked as CVE-2025-2778.
SysAid patched the vulnerabilities with the discharge of model 24.4.60 in early March. Variations 23.3.40 and earlier are impacted.
WatchTowr identified that the vulnerability disclosure didn’t go as easily because it had hoped, claiming that the seller solely responded as soon as firstly of the method. SecurityWeek has reached out to SysAid for remark and can replace this text if the corporate responds.Commercial. Scroll to proceed studying.
The Shadowserver Basis reported on Wednesday that it had recognized 77 internet-exposed SysAid situations that gave the impression to be unpatched.
WatchTowr has revealed a proof-of-concept (PoC) exploit that can be utilized for unauthenticated distant command execution.
It’s necessary that organizations deal with these vulnerabilities as menace actors focusing on SysAid situations isn’t extraordinary. In recent times, SysAid product vulnerabilities have been focused by each state-sponsored hackers and cybercrime teams.
SysAid says its ITSM merchandise are utilized by 10 million customers throughout 140 international locations.
Associated: Halo ITSM Vulnerability Uncovered Organizations to Distant Hacking
Associated: Ivanti Patches Important Vulnerabilities in Neurons for ITSM, Digital Site visitors Supervisor
Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day