Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Dozens of SysAid Instances Vulnerable to Remote Hacking

SysAid patches IT service management software vulnerabilities that can be chained for unauthenticated remote command execution. 

SysAid vulnerabilities exploited

Updates released recently by SysAid for its IT service management (ITSM) software patch vulnerabilities that can be chained for unauthenticated remote command execution.

Details of the vulnerabilities were disclosed on Wednesday by security firm WatchTowr. The company’s researchers discovered several XXE vulnerabilities that could be exploited by unauthenticated attackers using specially crafted requests.

They enable hackers to obtain local files containing sensitive information (including for full admin access to SysAid), access other systems on the network, and cause a DoS condition. 

However, WatchTowr researchers were unable to achieve remote command execution until they noticed that the SysAid update containing fixes for their vulnerabilities also patched an authenticated OS command injection issue discovered by an unnamed individual. 

An analysis of the patch for the command injection bug revealed that it could indeed be chained with one of their XXE flaws for unauthenticated remote command execution. 

The XXE flaws are tracked as CVE-2025-2775, CVE-2025-2776 and CVE-2025-2777, while the OS command injection issue is tracked as CVE-2024-36394.

Advertisement. Scroll to continue reading.

SysAid patched the vulnerabilities with the release of version 24.4.60 in early March. Versions 23.3.40 and earlier are impacted.

WatchTowr pointed out that the vulnerability disclosure did not go as smoothly as it had hoped, claiming that the vendor only responded once at the beginning of the process. SecurityWeek has reached out to SysAid for comment and will update this article if the company responds.

The Shadowserver Foundation reported on Wednesday that it had identified 77 internet-exposed SysAid instances that appeared to be unpatched. 

WatchTowr has published a proof-of-concept (PoC) exploit that can be used for unauthenticated remote command execution.

It’s important that organizations address these vulnerabilities as threat actors targeting SysAid instances is not unheard of. In recent years, SysAid product vulnerabilities were targeted by both state-sponsored hackers and cybercrime groups

SysAid says its ITSM products are used by 10 million users across 140 countries. 

UPDATE: SysAid has provided the following statement to SecurityWeek:

“Customer security is always our top priority. We promptly addressed the issue and released a patch to resolve the vulnerability. We thank watchTowr for their responsible disclosure and detailed reporting of the vulnerabilities, and we appreciate the joint effort in treating security with the seriousness it deserves. Internally, we’re reviewing the case to further strengthen our processes and ensure we remain proactive in protecting our users.”

*updated to replace CVE-2025-2778 with CVE-2024-36394

Related: Halo ITSM Vulnerability Exposed Organizations to Remote Hacking

Related: Ivanti Patches Critical Vulnerabilities in Neurons for ITSM, Virtual Traffic Manager

Related: Android Update Patches FreeType Vulnerability Exploited as Zero-Day

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.