SysAid Software Vulnerability Exploited by Ransomware Operation

SysAid has since released version 23.3 to address the vulnerability.
SysAid IT service management software users have been alerted about a zero-day vulnerability, tracked as CVE-2023-47246, exploited by affiliates of a ransomware operation.
The flaw is a path traversal issue that leads to arbitrary code execution, potentially allowing unauthorized access and control over the affected system.
The threat actor exploiting this vulnerability is known as Lace Tempest, an affiliate known for deploying Cl0p ransomware.
The vulnerability was confirmed by cybersecurity firm Profero, which discovered that the attacker could upload a WebShell and other payloads into the webroot of the SysAid Tomcat web service.

SysAid, a provider of IT service management software, has recently been targeted by a ransomware operation exploiting a zero-day vulnerability in its on-premises software. The vulnerability, identified as CVE-2023-47246, was first observed by Microsoft's threat intelligence team, who promptly notified SysAid. The flaw is a path traversal issue that leads to arbitrary code execution, potentially allowing unauthorized access and control over the affected system.

The threat actor exploiting this vulnerability is known as Lace Tempest, an affiliate known for deploying Cl0p ransomware. The group has previously exploited zero-day vulnerabilities in other software solutions. The exploitation of this vulnerability has likely resulted in ransomware deployment and/or data exfiltration.

The vulnerability was confirmed by cybersecurity firm Profero, which discovered that the attacker could upload a WebShell and other payloads into the webroot of the SysAid Tomcat web service. This allowed the attacker to issue commands via the SysAid software to deliver a loader for the Gracewire malware, enabling human-operated activity such as lateral movement, data theft, and ransomware deployment.

In response to the threat, SysAid's CTO Sasha Shapirov noted that the company immediately initiated their incident response protocol and began proactively communicating with their on-premise customers to ensure they could implement a mitigation solution. SysAid has since released version 23.3 to address the vulnerability.

The exploitation of this vulnerability underscores the importance of robust cybersecurity measures and the need for constant vigilance in the face of evolving threats. It also highlights the critical role of threat intelligence teams in identifying and responding to such threats in a timely manner.


Confidence

100%

No Doubts Found At Time Of Publication

Sources

95%

  • Unique Points
    • Microsoft's threat intelligence team first observed the exploitation and notified SysAid.
  • Accuracy
    No Contradictions at Time Of Publication
  • Deception (100%)
    None Found At Time Of Publication
  • Fallacies (100%)
    None Found At Time Of Publication
  • Bias (100%)
    None Found At Time Of Publication
  • Site Conflicts Of Interest (100%)
    None Found At Time Of Publication
  • Author Conflicts Of Interest (100%)
    None Found At Time Of Publication

95%

  • Unique Points
    • SysAid's advisory includes the results of an investigation by Profero, who discovered the vulnerability.
  • Accuracy
    No Contradictions at Time Of Publication
  • Deception (100%)
    None Found At Time Of Publication
  • Fallacies (100%)
    None Found At Time Of Publication
  • Bias (100%)
    None Found At Time Of Publication
  • Site Conflicts Of Interest (100%)
    None Found At Time Of Publication
  • Author Conflicts Of Interest (100%)
    None Found At Time Of Publication

95%

  • Unique Points
    • Cybersecurity firm Profero confirmed the vulnerability, which allowed the attacker to upload a WebShell and other payloads into the webroot of the SysAid Tomcat web service, providing unauthorized access and control over the affected system.
  • Accuracy
    No Contradictions at Time Of Publication
  • Deception (100%)
    None Found At Time Of Publication
  • Fallacies (100%)
    None Found At Time Of Publication
  • Bias (100%)
    None Found At Time Of Publication
  • Site Conflicts Of Interest (100%)
    None Found At Time Of Publication
  • Author Conflicts Of Interest (100%)
    None Found At Time Of Publication

95%

  • Unique Points
    • The vulnerability, identified as CVE-2023-47246, was discovered on November 2 after hackers exploited it to breach on-premise SysAid servers.
  • Accuracy
    No Contradictions at Time Of Publication
  • Deception (100%)
    None Found At Time Of Publication
  • Fallacies (100%)
    None Found At Time Of Publication
  • Bias (100%)
    None Found At Time Of Publication
  • Site Conflicts Of Interest (100%)
    None Found At Time Of Publication
  • Author Conflicts Of Interest (100%)
    None Found At Time Of Publication

95%

  • Unique Points
    • SysAid's CTO Sasha Shapirov noted that the company immediately initiated their incident response protocol and began proactively communicating with their on-premise customers to ensure they could implement a mitigation solution.
  • Accuracy
    No Contradictions at Time Of Publication
  • Deception (100%)
    None Found At Time Of Publication
  • Fallacies (100%)
    None Found At Time Of Publication
  • Bias (100%)
    None Found At Time Of Publication
  • Site Conflicts Of Interest (100%)
    None Found At Time Of Publication
  • Author Conflicts Of Interest (100%)
    None Found At Time Of Publication