Article Details

Scrape Timestamp (UTC): 2025-07-23 06:28:11.727

Source: https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html

Original Article Text

Click to Toggle View

CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below - Both shortcomings were disclosed by watchTowr Labs researchers Sina Kheirkhah and Jake Knott back in May, alongside CVE-2025-2777 (CVSS score: 9.3), a pre-authenticated XXE within the /lshw endpoint. The three vulnerabilities were addressed by SysAid in the on-premise version 24.4.60 build 16 released in early March 2025. The cybersecurity firm noted that the vulnerabilities could allow attackers to inject unsafe XML entities into the web application, resulting in a Server-Side Request Forgery (SSRF) attack, and in some cases, remote code execution when chained with CVE-2024-36394, a command injection flaw revealed by CyberArk last June. It's currently not known how CVE-2025-2775 and CVE-2025-2776 are being exploited in real-world attacks. Nor is any information available regarding the identity of the threat actors, their end goals, or the scale of these efforts. To safeguard against the active threat, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by August 12, 2025.

Daily Brief Summary

CYBERCRIME // CISA Reports Active Attacks on Newly Disclosed SysAid Vulnerabilities

CISA has added two newly exploited SysAid software vulnerabilities to its Known Exploited Vulnerabilities catalog.

These vulnerabilities involve potential for Server-Side Request Forgery (SSRF) and unauthorized remote file access.

Research by watchTowr Labs uncovered these flaws alongside CVE-2025-2777, a critical pre-authenticated XXE vulnerability.

SysAid addressed these vulnerabilities in March 2025 with an updated software release (version 24.4.60 build 16).

The specifics of the threats, including attacker identities and intents, remain unclear.

Federal Civilian Executive Branch agencies are mandated to implement the updates by August 12, 2025, to mitigate risks.

Attackers could also potentially execute remote code when exploiting these vulnerabilities in combination with another flaw from CyberArk.