Sunday, May 18, 2025
HomeCVE/vulnerabilitySysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution, enabling unauthenticated attackers to execute remote commands by exploiting several pre-auth XML External Entity (XXE) injection flaws.

The vulnerabilities, registered as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, highlight systemic risks in widely-used IT Service Management platforms.

SysAid ITSM On-Premise Plagued by Pre-Auth XXE Flaws

SysAid ITSM is a business-critical support ticketing and IT asset management platform, widely deployed in corporate environments.

- Advertisement - Google News

As per recent research by TowerLabs, attackers can exploit three distinct pre-auth XXE vulnerabilities on unpatched SysAid On-Premise deployments-potentially leading to Remote Command Execution (RCE) as the privileged SYSTEM user on Windows servers.

attacker-controlled server
attacker-controlled server

Vulnerability Breakdown

1. XXE in /mdm/checkin Endpoint (CVE-2025-2775):
A flaw in the GetMdmMessage#doPost handler allows unauthenticated POST requests containing malicious XML to be parsed without sanitization.

This triggers a classic XXE vulnerability, letting attackers leverage external entities-such as remote DTDs-to extract sensitive files and interact with internal services.

2. XXE in /mdm/serverurl Endpoint (CVE-2025-2776):
A second, nearly identical XXE exists in the same handler but for the /mdm/serverurl path, again allowing crafted XML payloads to trigger unauthenticated XXE.

3. XXE in /lshw Endpoint (CVE-2025-2777):
A third pre-auth XXE is present in the LshwAgent#doPost function. Here, user-supplied XML is handled by a SAX parser with no input validation, enabling attackers to inject arbitrary entities and escalate the attack.

While XXE vulnerabilities can sometimes be limited to file disclosure, in the case of SysAid ITSM, researchers demonstrated the ability to leak local files and probe internal network resources.

Despite recent mitigations in Java that hinder full file exfiltration, attackers can still extract single-line content or leverage error-based techniques for data leakage.

Given SysAid’s broad deployment and the sensitive nature of the data stored-including internal tickets, incidents, and asset inventories-these flaws represent a significant risk.

The remote, pre-auth nature of the attack lowers the barrier for exploitation and elevates the impact, particularly as ransomware gangs continually target such infrastructure for extortion and data theft.

The research team flagged the vulnerabilities to SysAid, who ultimately released patches after an extended communication period.

Organizations are urged to apply the latest security updates immediately, audit public-facing instances, and monitor for suspicious activity targeting the vulnerable endpoints.

This disclosure underscores the need for rigorous security assessments of business-critical platforms like ITSM solutions.

As attackers increasingly set their sights on such systems, maintaining up-to-date patching and vigilant monitoring remains essential in defending against modern cyber threats.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...