The user's summary accurately captures the core details of these critical vulnerabilities in SysAid On-Premises, an IT service management (ITSM) software used for help desk, ticketing, and asset management. Both flaws involve unauthenticated XML External Entity (XXE) injection, enabling attackers to perform server-side request forgery (SSRF), read arbitrary files, take over administrator accounts, and potentially achieve remote code execution (RCE). They were added to CISA's Known Exploited Vulnerabilities (KEV) catalog on July 22, 2025, based on evidence of active in-the-wild exploitation. While specific attack details (e.g., actors or campaigns) remain undisclosed, these vulnerabilities pose significant risks to organizations relying on on-premises SysAid deployments, potentially leading to data breaches or system compromise.Key facts from reports:
Aspect | CVE-2025-2775 | CVE-2025-2776 | Recommendations |
---|---|---|---|
Affected Component | Checkin processing | Server URL processing | Scan for exposed instances using tools like Shodan or Hunter.how. |
Vulnerability Type | Unauth XXE (admin takeover, file read) | Unauth XXE (SSRF, file read) | Enable logging for XML parsers; block external entity resolution. |
Affected Versions | On-Prem <=23.3.40 | On-Prem <=23.3.40 | Upgrade to 24.4.60+; test in staging first. |
KEV Addition Date | July 22, 2025 | July 22, 2025 | Federal due date: August 12, 2025; all orgs prioritize immediately. |
Potential Impact | RCE via chains, data exfiltration | Internal network access, pivoting | Hunt for signs of compromise using EDR; rotate creds post-patch. |
This incident underscores the dangers of unpatched on-premises ITSM tools, especially given SysAid's history of zero-day exploits. For PoC code or detailed technical analysis, check watchTowr Labs' resources. If you need help with detection scripts, patch verification, or further investigation into related threats, provide more details!