Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

Posted on July 23, 2025July 23, 2025 By CWS

Jul 23, 2025Ravie LakshmananVulnerability / Software program Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) added two safety flaws impacting SysAid IT help software program to its Identified Exploited Vulnerabilities (KEV) catalog, based mostly on proof of lively exploitation.
The vulnerabilities in query are listed beneath –

CVE-2025-2775 (CVSS rating: 9.3) – An improper restriction of XML exterior entity (XXE) reference vulnerability within the Checkin processing performance, permitting for administrator account takeover and file learn primitives
CVE-2025-2776 (CVSS rating: 9.3) – An improper restriction of XML exterior entity (XXE) reference vulnerability within the Server URL processing performance, permitting for administrator account takeover and file learn primitives

Each shortcomings had been disclosed by watchTowr Labs researchers Sina Kheirkhah and Jake Knott again in Could, alongside CVE-2025-2777 (CVSS rating: 9.3), a pre-authenticated XXE inside the /lshw endpoint.

The three vulnerabilities had been addressed by SysAid within the on-premise model 24.4.60 construct 16 launched in early March 2025.
The cybersecurity agency famous that the vulnerabilities may permit attackers to inject unsafe XML entities into the online utility, leading to a Server-Aspect Request Forgery (SSRF) assault, and in some circumstances, distant code execution when chained with CVE-2024-36394, a command injection flaw revealed by CyberArk final June.
It is presently not identified how CVE-2025-2775 and CVE-2025-2776 are being exploited in real-world assaults. Neither is any info obtainable concerning the identification of the menace actors, their finish targets, or the dimensions of those efforts.
To safeguard towards the lively menace, Federal Civilian Government Department (FCEB) companies are required to use the required fixes by August 12, 2025.

The Hacker News Tags:Access, Active, Attack, Enable, File, Flaws, Remote, SSRF, SysAid

Post navigation

Previous Post: Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users
Next Post: CISA Warns of SysAid Vulnerability Exploitation

Related Posts

5 BCDR Essentials for Effective Ransomware Defense The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News