Skip to main content

NetSupport Releases Security Updates for NetSupport Manager

Successful exploitation could lead to arbitrary local file disclosure, unauthorised access to NetSupport Manager and remote code execution in the context of the NetSupport Manager connectivity service.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Successful exploitation could lead to arbitrary local file disclosure, unauthorised access to NetSupport Manager and remote code execution in the context of the NetSupport Manager connectivity service.


Affected platforms

The following platforms are known to be affected:

Threat details

Proof-of-Concept Exploit

Security researchers have published a proof-of-concept exploit for CVE-2025-34179, CVE-2025-34180 and CVE-2025-34181. 

The NHS England National CSOC assesses future exploitation as likely.


Introduction

NetSupport has released security updates addressing 3 vulnerabilities in NetSupport Manager. 

  • CVE-2025-34179  - an 'Information Disclosure via Unauthenticated SQL Injection' vulnerability with a CVSSv3 score of 8.7.
  • CVE-2025-34180 -  a 'Weak Password Encoding' vulnerability with a CVSSv3 score of 8.7.
  • CVE-2025-34181 - a 'Remote Code Execution via Arbitrary File Upload' vulnerability with a CVSSv3 score of 8.7.

Remediation advice

Affected organisations are encouraged to review NetSupport's security advisory and apply the relevant updates as soon as possible.



CVE Vulnerabilities

Last edited: 17 December 2025 1:45 pm