SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html
https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
https://securelist.com/malware-report-q2-2025-pc-iot-statistics/117421/
https://www.infosecurity-magazine.com/news/automation-vulnerability/
https://www.infosecurity-magazine.com/news/ransomware-simplehelp-compromise/
https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
https://thehackernews.com/2025/05/dragonforce-exploits-simplehelp-flaws.html
https://www.theregister.com/2025/05/28/dragonforce_ransomware_gang_sets_fire/
https://www.securityweek.com/dragonforce-ransomware-hackers-exploiting-simplehelp-vulnerabilities/
https://www.infosecurity-magazine.com/news/dragonforce-ransomware-msp-attack/
https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
https://www.securityweek.com/simplehelp-remote-access-software-exploited-in-attacks/
https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html
https://securityaffairs.com/173578/security/attackers-exploit-simplehelp-rmm-software-flaws.html
https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
Published: 2025-01-15
Updated: 2026-04-24
Known Exploited Vulnerability (KEV)
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.45963
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest