
Cloud Vulnerability DB
A community-led vulnerabilities database
SimpleHelp remote support software v5.5.7 and earlier contains a critical vulnerability (CVE-2024-57728) that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (zip slip). This vulnerability affects the SimpleHelp server software and was discovered in January 2025 (NVD, SimpleHelp KB).
The vulnerability allows an authenticated administrative user to exploit a file upload functionality to place files in arbitrary locations on the SimpleHelp server host. For Linux servers, an attacker could exploit this vulnerability to upload a crontab file to execute remote commands. For Windows servers, an attacker could overwrite executables or libraries used by SimpleHelp to achieve remote code execution. The vulnerability has been assigned a CVSS v3.1 base score of 7.2 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (Horizon3).
If successfully exploited, this vulnerability allows attackers to execute arbitrary code on the host in the context of the SimpleHelp server user. The impact is particularly severe as SimpleHelp servers can be used to manage multiple client machines, potentially allowing an attacker to compromise not just the server but also connected client systems (Arctic Wolf).
SimpleHelp has released patched versions to address this vulnerability: version 5.5.8 for v5.5.x users, version 5.4.10 for v5.4.x users, and version 5.3.9 for v5.3.x users. Organizations are strongly advised to upgrade to these patched versions immediately. Additionally, SimpleHelp recommends changing the administrator password of the SimpleHelp server, rotating passwords for Technician accounts, and restricting the IP addresses from which the SimpleHelp server can accept Technician and administrator logins (SimpleHelp KB).
The security community has noted that this vulnerability is part of a broader trend of vulnerabilities in remote support software, following similar critical issues in products like ConnectWise ScreenConnect and BeyondTrust. Security researchers emphasize the particular risk these vulnerabilities pose given that a single compromise of a remote support tool can potentially affect multiple supported organizations (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."