PT-2024-1799 · Connectwise · Connectwise Screenconnect
Jheysel-R7
+1
·
Published
2024-02-21
·
Updated
2025-10-15
·
CVE-2024-1709
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
ConnectWise ScreenConnect versions 23.9.7 and prior
Description
The vulnerability is an authentication bypass using an alternate path or channel, which may allow an attacker direct access to confidential information or critical systems. This issue has been exploited in real-world attacks, with threat actors using it to deploy ransomware and steal information. The estimated number of potentially affected devices worldwide is not specified, but it is known that hundreds of initial access brokers and cybercrime gangs are exploiting this vulnerability, threatening organizations and downstream customers. Technical details about exploitation include the use of an alternate path or channel to bypass authentication, potentially allowing attackers to create admin accounts, delete other users, and take over vulnerable instances.
Recommendations
To resolve the issue for ConnectWise ScreenConnect versions 23.9.7 and prior, update to the patched version immediately. As a temporary workaround, consider restricting access to the vulnerable software until a patch is applied. Additionally, enabling multi-factor authentication (MFA) can help minimize the risk of exploitation. It is also recommended to apply mitigations to protect organizations from cyberattacks, such as those suggested by CISA.
Exploit
Fix
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2024-01531
CVE-2024-1709
Affected Products
Connectwise Screenconnect
References · 308
- 🔥 https://github.com/rapid7/metasploit-framework/pull/18870⭐ 36014 🔗 14416 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE⭐ 94 🔗 26 · Exploit
- 🔥 https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc⭐ 70 🔗 18 · Exploit
- 🔥 https://huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass · Exploit
- 🔥 https://huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 · Exploit
- 🔥 https://nvd.nist.gov/vuln/detail/CVE-2024-1709 · Exploit
- https://bdu.fstec.ru/vul/2024-01531 · Security Note
- https://connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 · Security Note, Vendor Advisory
- https://twitter.com/binalyze/status/1762494020175949868 · Twitter Post
- https://t.me/sysadm_in_up/2070 · Telegram Post
- https://twitter.com/gothburz/status/1760673293278089408 · Twitter Post
- https://twitter.com/ooda/status/1762111590013309305 · Twitter Post
- https://t.me/aptreports/9833 · Telegram Post
- https://twitter.com/cybertzar/status/1764946433994522787 · Twitter Post