WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

CISA Alerts on Active Exploitation of SysAid Vulnerability

CISA Alerts on Active Exploitation of SysAid Vulnerability

CISA has added two recently patched SysAid On-Prem vulnerabilities to its Known Exploited Vulnerabilities catalog. 

Identified as CVE-2025-2776 and CVE-2025-2775, the flaws were addressed in early March with the release of SysAid version 24.4.60 of its IT service management software. 

Originally discovered by WatchTowr in December 2024, these XXE vulnerabilities were later disclosed in May 2025 along with proof-of-concept exploit code. WatchTowr noted that they could potentially be chained with CVE-2024-36394, a separate OS command injection flaw, to allow unauthenticated remote command execution. 

SysAid says its ITSM products are used by 10 million users globally. At the time of disclosure, Shadowserver Foundation found only 77 exposed instances vulnerable to these flaws. 

There are no confirmed reports of active exploitation involving CVE-2025-2776 or CVE-2025-2775. Both are similar pre-authentication XXE issues. Interestingly, the OS command injection flaw CVE-2024-36394, which was included in WatchTowr's exploit chain, has not yet been added to the KEV list. CISA has stated that the vulnerabilities have not been linked to ransomware attacks. 

Still, past incidents suggest ransomware actors have exploited SysAid flaws before. In 2023, Cl0p ransomware affiliates targeted a zero-day vulnerability labeled CVE-2023-47246

CyberSecurityInSights has contacted both WatchTowr and SysAid for further comment and will provide updates if a response is received. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.