CVE-2024-57726

Published Jan 15, 2025

Last updated a year ago

Overview

Description
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
Source
cve@mitre.org
NVD status
Modified
Products
simplehelp

Risk scores

CVSS 3.1

Type
Primary
Base score
9.9
Impact score
6
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-862

Social media

Hype score
Not currently trending
  1. Medusa & DragonForce RaaS groups weaponize SimpleHelp RMM flaws (CVE-2024-57726/7/8) to gain SYSTEM-level access to customer networks. Immediate patch needed. #Ransomware #SimpleHelp #RMM #Cybersecurity #SupplyChainAttack #Medusa #DragonForce https://t.co/VczUxLIelB

    @the_yellow_fall

    10 Nov 2025

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Articles like this just highlight the need for a solution like ZKX Helix. "ransomware groups, have been observed exploiting three vulnerabilities in the remote monitoring and management (RMM) software SimpleHelp... Tracked as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726,

    @zkxsolutions

    5 Jun 2025

    64 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. The FBI reports Play ransomware has impacted around 900 victims worldwide as of May 2025, using recompiled malware & extortion tactics via stolen data. Vulnerabilities CVE-2024-57726/27/28 exploited. 🔐🌍 #CyberAttack #Global #USA https://t.co/hEvKHLEGei

    @TweetThreatNews

    4 Jun 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 📌 DragonForce ransomware group exploited SimpleHelp RMM tool to exfiltrate data and deploy ransomware. Three vulnerabilities (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) likely used. #CyberSecurity #Ransomware https://t.co/B8id4j6KrT https://t.co/LovB8l3lUx

    @CyberHub_blog

    30 May 2025

    45 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Does your MSP use the RMM tool of Simple Help? Have you checked and patched for these CVEs: CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726? How are you managing your 3rd Party Risks? Or have you considered 3rd party risks as part of your overall risk management?

    @irsecfink

    28 May 2025

    40 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Des chercheurs de Sophos ont révélé que des opérateurs du ransomware DragonForce ont exploité une chaîne de trois vulnérabilités (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) dans le logiciel SimpleHelp pour attaquer un fournisseur de services gérés. https://t.co/koZ

    @cert_ist

    28 May 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. DragonForce Ransomware Hits MSPs via SimpleHelp Vulnerabilities Using CVE-2024-57726/27/28, DragonForce breached an MSP, deploying ransomware across clients. The group targets RMM tools—patch now or risk supply chain compromise. https://t.co/3gaYn0i08j #MSP #CyberSecurity ht

    @dCypherIO

    28 May 2025

    39 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. A MSP and its clients were targeted via chained vulnerabilities in SimpleHelp RMM (CVE-2024-57726/27/28), enabling full system access, data theft, and ransomware deployment. Patches released in Jan were exploited by attackers. ⚠️ #CyberAttack #UK https://t.co/svCneXeMt8

    @TweetThreatNews

    27 May 2025

    53 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  9. CVE-2024-57726., CVE-2024-57727., CVE-2024-57728. Enterprise egg-shell

    @byt3n33dl3

    15 Feb 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Vulnerabilidades de SimpleHelp RMM (CVE-2024-57726, CVE-2024-57727 y CVE-2024-57728) señaladas por Arctic permiten implementar puertas traseras y crear cuentas para obtener control administrativo, instalar puertas traseras y eventualmente desplegar ransomware. 🧉 https://t.co/Uq

    @MarquisioX

    11 Feb 2025

    35 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Threat actors exploit newly disclosed vulnerabilities in SimpleHelp's Remote Monitoring and Management (RMM) software to gain unauthorized access and lay the groundwork for ransomware attacks. These vulnerabilities (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728) https://t.co

    @smart_c_intel

    10 Feb 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. Hackers are targeting vulnerable SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. The flaws are tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728. https://t.co/gg6fqRHwqF https://t.co/y

    @riskigy

    9 Feb 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Hackers are exploiting vulnerabilities in SimpleHelp RMM, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, to breach corporate networks. Attackers create unauthorized admin accounts, install backdoors, and may prepare for ransomware attacks. Evidence suggests links…

    @y1659rsgh

    8 Feb 2025

    4 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. SimpleHelp RMM flaws exploited to breach corporate networks: https://t.co/dzrUnoyfkC Hackers are exploiting vulnerabilities in SimpleHelp RMM, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, to breach corporate networks. Attackers create unauthorized admin… https:

    @securityRSS

    7 Feb 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨 URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware. CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution. https://t.co/pHaiAm

    @SamTechwest

    7 Feb 2025

    68 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Hackers are exploiting vulnerabilities in SimpleHelp RMM (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728) for ransomware attacks. Organizations must update their software to reduce risk. 🛡️💻 #RMM #Ransomware #USA link: https://t.co/iIX2aGlrYX https://t.co/i81hVkLDco

    @TweetThreatNews

    7 Feb 2025

    17 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚨 URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware. CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution. 👉 Secure your… ht

    @TheHackersNews

    7 Feb 2025

    46405 Impressions

    47 Retweets

    134 Likes

    16 Bookmarks

    3 Replies

    3 Quotes

  18. Уязвимости в SimpleHelp Remote Monitoring and Management (RMM), такие как CVE-2024-57726, CVE-2024-57727 и CVE-2024-57728, позволяют злоумышленникам загружать и выгружать файлы, а также повышать привилегии до уровня администратора. Подробнее https://t.co/TrPw17sEP7 https://t.co/D

    @KZCERT

    30 Jan 2025

    73 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. From @AWNetworks: A campaign has been observed involving unauthorized access to devices running #SimpleHelp RMM software as an initial access vector. This came just a week after we publicly disclosed CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728 in SimpleHelp. For the full

    @Horizon3ai

    29 Jan 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Update: Critical vulnerabilities in #SimpleHelp are now being exploited (#CVE-2024-57727, #CVE-2024-57728, #CVE-2024-57726); These can lead to info disclosure, privilege escalation, and RCE. Patch and advisory are available at: https://https://t.co/UlONgZAyDI #Patch #Patch #Patch

    @CCBalert

    29 Jan 2025

    247 Impressions

    2 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Hackers exploiting flaws in SimpleHelp RMM to breach networks. The flaws, tracked as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, allow threat actors to download and upload files on devices and escalate privileges to administrative levels. https://t.co/knnGrF94Qo https://

    @riskigy

    29 Jan 2025

    50 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Researchers warn of a cyberattack exploiting SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing unauthorized device access. Ensure software is updated! 🔒💻 #SimpleHelp #CyberThreats #USA link: https://t.co/wdljUdasgh https://t.co/s1hk2hVJO

    @TweetThreatNews

    28 Jan 2025

    42 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  23. CVE-2024-57726, -27, -28: Multiple vulns in SimpleHelp, 7.2 - 8.8 rating❗️ Vulns allow to upload arbitrary files, and escalate privileges, which allows RCE to be carried out. Search at https://t.co/hv7QKSr5Jp: 👉 Link: https://t.co/ElCom28yx9 #cybersecurity #vulnerability_map

    @Netlas_io

    20 Jan 2025

    713 Impressions

    4 Retweets

    12 Likes

    6 Bookmarks

    1 Reply

    0 Quotes

  24. 4/10 🔒 CVE-2024-57726: Tech access can become admin access due to poor authorization. Escalation chain could be devastating. #PrivilegeEscalation

    @Eth1calHackrZ

    18 Jan 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Warning: Critical vulnerabilities in SimpleHelp remote access software (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) can lead to info disclosure, privilege escalation, and RCE. Patch and advisory are available at: https://t.co/HhQIqSK040 #Patch #Patch #Patch

    @CCBalert

    16 Jan 2025

    161 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. CVE-2024-57726 SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These A… https://t.co/4fP9PcSZ0w

    @CVEnew

    16 Jan 2025

    328 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. CVE-2024-57726 Privilege Escalation via Insecure API Key Generation in SimpleHelp https://t.co/9ZwX20QzXK

    @VulmonFeeds

    16 Jan 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 🚨Alert🚨 CVE-2024-57727&&CVE-2024-57728&&CVE-2024-57726 : Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks 📊 75k+ Services are found on https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/LxDmNVsdm9 👇Query HUNTER… https:/

    @HunterMapping

    16 Jan 2025

    1336 Impressions

    3 Retweets

    17 Likes

    6 Bookmarks

    0 Replies

    0 Quotes

  29. We disclosed a few vulns last week affecting SimpleHelp's remote support software: ♦️ CVE-2024-57726: Priv esc to admin ♦️ CVE-2024-57727: Unauth arbitrary file download ♦️ CVE-2024-57728: Admin RCE via arbitrary file upload Together these vulns could enable an attacker with…

    @Horizon3Attack

    15 Jan 2025

    6709 Impressions

    20 Retweets

    74 Likes

    24 Bookmarks

    0 Replies

    0 Quotes

Configurations