Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Dozens of SysAid Instances Vulnerable to Remote Hacking

Posted on May 8, 2025May 8, 2025 By CWS

Updates launched not too long ago by SysAid for its IT service administration (ITSM) software program patch vulnerabilities that may be chained for unauthenticated distant command execution.

Particulars of the vulnerabilities have been disclosed on Wednesday by safety agency WatchTowr. The corporate’s researchers found a number of XXE vulnerabilities that could possibly be exploited by unauthenticated attackers utilizing specifically crafted requests.

They permit hackers to acquire native information containing delicate info (together with for full admin entry to SysAid), entry different methods on the community, and trigger a DoS situation. 

Nevertheless, WatchTowr researchers have been unable to attain distant command execution till they seen that the SysAid replace containing fixes for his or her vulnerabilities additionally patched an authenticated OS command injection subject found by an unnamed particular person. 

An evaluation of the patch for the command injection bug revealed that it may certainly be chained with one in all their XXE flaws for unauthenticated distant command execution. 

The XXE flaws are tracked as CVE-2025-2775, CVE-2025-2776 and CVE-2025-2777, whereas the OS command injection subject is tracked as CVE-2025-2778.

SysAid patched the vulnerabilities with the discharge of model 24.4.60 in early March. Variations 23.3.40 and earlier are impacted.

WatchTowr identified that the vulnerability disclosure didn’t go as easily because it had hoped, claiming that the seller solely responded as soon as firstly of the method. SecurityWeek has reached out to SysAid for remark and can replace this text if the corporate responds.Commercial. Scroll to proceed studying.

The Shadowserver Basis reported on Wednesday that it had recognized 77 internet-exposed SysAid situations that gave the impression to be unpatched. 

WatchTowr has revealed a proof-of-concept (PoC) exploit that can be utilized for unauthenticated distant command execution.

It’s necessary that organizations deal with these vulnerabilities as menace actors focusing on SysAid situations isn’t extraordinary. In recent times, SysAid product vulnerabilities have been focused by each state-sponsored hackers and cybercrime teams. 

SysAid says its ITSM merchandise are utilized by 10 million customers throughout 140 international locations. 

Associated: Halo ITSM Vulnerability Uncovered Organizations to Distant Hacking

Associated: Ivanti Patches Important Vulnerabilities in Neurons for ITSM, Digital Site visitors Supervisor

Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day

Security Week News Tags:Dozens, Hacking, Instances, Remote, SysAid, Vulnerable

Post navigation

Previous Post: Masimo Manufacturing Facilities Hit by Cyberattack
Next Post: Cisco Patches 35 Vulnerabilities Across Several Products

Related Posts

Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits Security Week News
Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News
Critical Vulnerability Patched in SAP NetWeaver Security Week News
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Security Week News
Russian Government Hackers Caught Buying Passwords from Cybercriminals Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News