PT-2024-1799 · Connectwise · Connectwise Screenconnect
Jheysel-R7
+1
·
Published
2024-02-21
·
Updated
2025-08-27
·
CVE-2024-1709
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
ConnectWise ScreenConnect versions 23.9.7 and prior
Description:
The vulnerability is an authentication bypass using an alternate path or channel, which may allow an attacker direct access to confidential information or critical systems. This issue has been exploited in real-world attacks, with threat actors using it to deploy ransomware and steal information. The estimated number of potentially affected devices worldwide is not specified, but it is known that hundreds of initial access brokers and cybercrime gangs are exploiting this vulnerability, threatening organizations and downstream customers. Technical details about exploitation include the use of an alternate path or channel to bypass authentication, potentially allowing attackers to create admin accounts, delete other users, and take over vulnerable instances.
Recommendations:
To resolve the issue for ConnectWise ScreenConnect versions 23.9.7 and prior, update to the patched version immediately. As a temporary workaround, consider restricting access to the vulnerable software until a patch is applied. Additionally, enabling multi-factor authentication (MFA) can help minimize the risk of exploitation. It is also recommended to apply mitigations to protect organizations from cyberattacks, such as those suggested by CISA.
Exploit
Fix
Authentication Bypass Using an Alternate Path or Channel
Weakness Enumeration
Related Identifiers
Affected Products
References · 302
- 🔥 https://github.com/rapid7/metasploit-framework/pull/18870⭐ 36014 🔗 14416 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE⭐ 94 🔗 26 · Exploit
- 🔥 https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc⭐ 70 🔗 18 · Exploit
- 🔥 https://huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 · Exploit
- 🔥 https://nvd.nist.gov/vuln/detail/CVE-2024-1709 · Exploit
- 🔥 https://huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass · Exploit
- https://bdu.fstec.ru/vul/2024-01531 · Security Note
- https://connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 · Security Note, Vendor Advisory
- https://twitter.com/evanderburg/status/1762075851368374786 · Twitter Post
- https://twitter.com/tech_nique__/status/1772433181070745986 · Twitter Post
- https://twitter.com/gothburz/status/1760384244101116075 · Twitter Post
- https://twitter.com/brody_n77/status/1760419555544105079 · Twitter Post
- https://twitter.com/pravin_karthik/status/1772637991594324310 · Twitter Post
- https://twitter.com/yngwieocalasty1/status/1765055979711013114 · Twitter Post