CVE detail
CVE-2024-57727: SimpleHelp Path Traversal Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
SimpleHelp · SimpleHelp
- Date added (KEV)
- Feb 13, 2025
- CISA due date
- Mar 06, 2025
- Ransomware campaign use
- Known
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vendor fix: Vendor advisory
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
SimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.
https://simple-help.com/kb---security-vulnerabilities-01-2025 ; Additional CISA Mitigation Instructions: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a ; https://nvd.nist.gov/vuln/detail/CVE-2024-57727
References
- https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlierRelease Notes
- https://www.horizon3.ai/attack-research/disclosures/critical-vulnerabilities-in-simplehelp-remote-support-software/Third Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-57727US Government Resource
Other recent CVEs from SimpleHelp
- CVE-2024-57726SimpleHelp — SimpleHelp Missing Authorization Vulnerability
- CVE-2024-57728SimpleHelp — SimpleHelp Path Traversal Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching SimpleHelp changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.