Three Vulnerabilities in SimpleHelp Remote Access Software Identified

by | Feb 9, 2025

The American Hospital Association (AHA) along with the Health Information Sharing and Analysis Center (Health-ISAC) released a cybersecurity alert concerning three vulnerabilities identified in the SimpleHelp Remote Monitoring and Management (RMM) software that are thought to be actively exploited. Healthcare providers were instructed to implement patches for the vulnerabilities immediately.

Researchers at Horizon3 identified the vulnerabilities in December 2024 and advised SimpleHelp on January 6, 2025. On January 13, 2025, the vulnerabilities were announced to the public along with the release of patches to resolve the vulnerabilities. One week after the announcement, threat actors are believed to have begun vulnerability exploitation. Researchers at Arctic Wolf noticed malicious activity on January 22, 2024. Although there is no confirmation that the intrusion on vulnerable SimpleHelp servers took advantage of these particular vulnerabilities, the timing seems to point to these vulnerabilities as the probable source of the attacks. Arctic Wolf states that the attackers gathered network intelligence, a preliminary to privilege escalation and lateral movement; nevertheless, the malicious session was ended before the observation of further actions.

The vulnerability CVE-2024-57726 is a privilege escalation vulnerability with a CVSS score of 9.9. Vulnerability CVE-2024-57727 is a directory traversal vulnerability with a CVSS score of 7.5). Vulnerability CVE-2024-57728 is a path traversal vulnerability with a CVSS score of 7.2. Threat actors that succeed in exploiting the vulnerabilities could upload and download files, read, alter, and delete information, elevate privileges to the admin level, and implement arbitrary code.

About 580 SimpleHelp servers are compromised online, the majority of which are based in the United States. The vulnerabilities impacted SimpleHelp versions 5.3, 5.4, and 5.5 and were resolved in versions 5.3.9, 5.4.10, and 5.5.8. Because the vulnerabilities are likely to be actively exploited, software must be upgraded to the most recent version immediately and employees must receive updated HIPAA training. Investigations must also be done to find out when the vulnerabilities were exploited.

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

COMPREHENSIVE HIPAA TRAINING

Please enable JavaScript in your browser to complete this form.

Ryan Coyne

Ryan Coyne is a results-driven leader in the healthcare compliance industry, specializing in regulatory compliance, compliance training, and assisting healthcare organizations and business associates in achieving and maintaining compliance. With a deep knowledge of healthcare regulations and a keen understanding of the challenges faced by the industry, Ryan has developed a reputation as a trusted advisor and advocate for ethical and compliant practices in healthcare. Ryan has successfully advised and guided numerous healthcare organizations, business associates, and healthcare professionals on achieving and maintaining compliance with regulatory training requirements. Ryan's professional focus is using his in-depth expertise and leading a world class team of subject matter experts at ComplianceJunction in regulatory compliance to help organisations navigate the complex landscape of ensuring staff adhere to healthcare regulations. You can connect with Ryan via LinkedIn and follow on Twitter

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

Comprehensive HIPAA Training

Used in 1000+ Healthcare Organizations and 100+ Universities

    Full Course - Immediate Access

    Privacy Policy