ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel
vulnerability, which may allow an attacker direct access to confidential information or
critical systems.
CPE | Name | Operator | Version |
---|---|---|---|
screenconnect | lt | 23.9.8 |
github.com/rapid7/metasploit-framework/pull/18870
github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/
www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/
www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2
www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8
www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/