SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
https://www.securityweek.com/simplehelp-remote-access-software-exploited-in-attacks/
https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html
https://securityaffairs.com/173578/security/attackers-exploit-simplehelp-rmm-software-flaws.html
https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
Published: 2025-01-15
Updated: 2025-01-31
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 9.9
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00121
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest