← Volver a CVEs
CVE-2023-25718
CRITICAL9.8
Descripcion
In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/13/2023
Ultima modificacion6/19/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
connectwise:control
Debilidades (CWE)
CWE-347
Referencias
https://www.connectwise.com/blog/cybersecurity/the-importance-of-responsible-security-disclosures(cve@mitre.org)
https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/(af854a3a-2127-422b-91ae-364da2661108)
https://www.connectwise.com(af854a3a-2127-422b-91ae-364da2661108)
https://www.connectwise.com/blog/cybersecurity/the-importance-of-responsible-security-disclosures(af854a3a-2127-422b-91ae-364da2661108)
https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.