ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
https://securelist.com/vulnerability-exploit-report-q2-2024/113455/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-131a
https://securelist.com/vulnerability-report-q1-2024/112554/
https://veriti.ai/blog/vulnerable-villain-when-hackers-get-hacked/
https://thehackernews.com/2024/03/china-linked-group-breaches-networks.html
https://www.mandiant.com/resources/blog/initial-access-brokers-exploit-f5-screenconnect
https://www.mandiant.com/resources/blog/connectwise-screenconnect-hardening-remediation
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
Published: 2024-02-21
Updated: 2024-02-23
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 10
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
Base Score: 10
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Severity: Critical