CVE-2024-1709

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
References
Link Resource
https://github.com/rapid7/metasploit-framework/pull/18870 Issue Tracking Patch Third Party Advisory
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc Exploit Third Party Advisory
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ Press/Media Coverage Third Party Advisory
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ Press/Media Coverage Third Party Advisory
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 Vendor Advisory
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ Third Party Advisory
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass Exploit Third Party Advisory
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 Third Party Advisory
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 Third Party Advisory
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ Press/Media Coverage Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/18870 Issue Tracking Patch Third Party Advisory
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc Exploit Third Party Advisory
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ Press/Media Coverage Third Party Advisory
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ Press/Media Coverage Third Party Advisory
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 Vendor Advisory
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ Third Party Advisory
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass Exploit Third Party Advisory
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 Exploit Third Party Advisory
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 Third Party Advisory
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ Press/Media Coverage Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*

History

27 Jan 2025, 21:48

Type Values Removed Values Added
References () https://github.com/rapid7/metasploit-framework/pull/18870 - Issue Tracking, Third Party Advisory () https://github.com/rapid7/metasploit-framework/pull/18870 - Issue Tracking, Patch, Third Party Advisory
References () https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 - Third Party Advisory () https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 - Exploit, Third Party Advisory

Information

Published : 2024-02-21 16:15

Updated : 2025-01-27 21:48


NVD link : CVE-2024-1709

Mitre link : CVE-2024-1709

CVE.ORG link : CVE-2024-1709


JSON object : View

Products Affected

connectwise

  • screenconnect
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

NVD-CWE-Other