ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·11/13/2023
CVE-2023-47246 added to CISA KEV: SysAid SysAid Server
Status: ✅ Confirmed exploited in the wild
Date added: 2023-11-13
Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Due date: 2023-12-04
Why this matters
SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.