Cyber Posture

CVE-2024-57726

CriticalCISA KEVActive Exploitation

Published: 15 January 2025

Published
15 January 2025
Modified
24 April 2026
KEV Added
24 April 2026
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.4916 97.8th percentile
Risk Priority 69 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2024-57726 is a critical vulnerability in SimpleHelp remote support software versions 5.5.7 and earlier. It enables low-privileged technicians to create API keys with excessive permissions, which can then be leveraged to escalate privileges to the server administrator role. The issue carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is linked to CWE-862 (Missing Authorization), with additional NVD-CWE-noinfo categorization.

Low-privileged technicians with network access to the affected SimpleHelp instance can exploit this vulnerability without requiring user interaction or high complexity. Exploitation allows creation of over-privileged API keys, resulting in full server admin access and potential high-impact compromise across confidentiality, integrity, and availability due to the scope change.

Vendor and security advisories, including SimpleHelp's knowledge base article on vulnerabilities in v5.5.7 and earlier, Horizon3.ai's disclosure on critical flaws in the software, and its listing in the CISA Known Exploited Vulnerabilities Catalog, outline patches and mitigation steps for affected deployments.

This vulnerability has seen real-world exploitation, as evidenced by its inclusion in CISA's KEV catalog and references in reports on ransomware operations, such as Microsoft’s analysis of Storm-1175 targeting web-facing assets in Medusa ransomware campaigns and Trend Micro’s coverage of DragonForce ransomware activity.

Details

CWE(s)
NVD-CWE-noinfoCWE-862
KEV Date Added
24 April 2026

Affected Products

simple-help
simplehelp
≤ 5.5.8

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability allows low-privilege technicians to create API keys with excessive permissions, enabling exploitation for privilege escalation to the server admin role.

References