← Voltar para CVEs
CVE-2024-1709
CRITICALCISA KEV10.0
Descricao
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Detalhes CVE
Pontuacao CVSS v3.110.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/21/2024
Ultima modificacao2/26/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorConnectWise
ProdutoScreenConnect
Nome da vulnerabilidadeConnectWise ScreenConnect Authentication Bypass Vulnerability
Data inclusao KEV2024-02-22
Prazo de remediacao2024-02-29
Uso em ransomwareKnown
Produtos afetados
connectwise:screenconnect
Fraquezas (CWE)
CWE-288
Referencias
https://github.com/rapid7/metasploit-framework/pull/18870(9119a7d8-5eab-497f-8521-727c672e3725)
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc(9119a7d8-5eab-497f-8521-727c672e3725)
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/(9119a7d8-5eab-497f-8521-727c672e3725)
https://github.com/rapid7/metasploit-framework/pull/18870(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc(af854a3a-2127-422b-91ae-364da2661108)
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/(af854a3a-2127-422b-91ae-364da2661108)
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/(af854a3a-2127-422b-91ae-364da2661108)
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8(af854a3a-2127-422b-91ae-364da2661108)
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/(af854a3a-2127-422b-91ae-364da2661108)
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass(af854a3a-2127-422b-91ae-364da2661108)
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2(af854a3a-2127-422b-91ae-364da2661108)
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8(af854a3a-2127-422b-91ae-364da2661108)
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1709(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.