• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Critical Flaws Found in ConnectWise ScreenConnect Software

Posted on February 23, 2024 by admin

[ad_1]

Feb 20, 2024NewsroomVulnerability / Network Security

ConnectWise ScreenConnect Software

ConnectWise has released software updates to address two security flaws in its ScreenConnect remote desktop and access software, including a critical bug that could enable remote code execution on affected systems.

The vulnerabilities are listed below –

  • CVE-2024-1708 (CVSS score: 8.4) – Improper limitation of a pathname to a restricted directory aka “path traversal”
  • CVE-2024-1709 (CVSS score: 10.0) – Authentication bypass using an alternate path or channel

The company deemed the severity of the issues as critical, citing they “could allow the ability to execute remote code or directly impact confidential data or critical systems.”

Cybersecurity

Both the vulnerabilities impact ScreenConnect versions 23.9.7 and prior, with fixes available in version 23.9.8. The flaws were reported to the company on February 13, 2024.

While there is no evidence that the shortcomings have been exploited in the wild, users who are running self-hosted or on-premise versions are recommended to update to the latest version as soon as possible.

“ConnectWise will also provide updated versions of releases 22.4 through 23.9.7 for the critical issue, but strongly recommend that partners update to ScreenConnect version 23.9.8,” the IT management software company said.

Cybersecurity firm Huntress said it found more than 8,800 servers running a vulnerable version of ScreenConnect. It has also demonstrated a proof-of-concept (PoC) exploit that it said can be “recreated with ease and required minimal technical knowledge” and used to bypass authentication on unpatched ScreenConnect servers.

ConnectWise Flaws Come Under Active Exploitation

ConnectWise has since revised its advisory to note that it has “received updates of compromised accounts,” indicating active exploitation of the flaws. It said the attacks originated from the following IP addresses –

  • 155.133.5[.]15
  • 155.133.5[.]14
  • 118.69.65[.]60

The exact scale of the campaign is currently unknown, although cybersecurity company Rapid7 said observed exploitation within customer environments.

Cybersecurity

Huntress has also shared additional technical details of the two vulnerabilities, stating the exploit is “trivial and embarrassingly easy” and that they are being leveraged to deploy the Cobalt Strike adversary simulation framework for post exploitation.

The shortcomings, in particular, could be weaponized to create a rogue administrator account and take control of ScreenConnect and even access or modify files in other directories, leading to arbitrary code execution.

PoC exploits for the authentication bypass bug have also been released by watchTowr Labs and Horizon3.ai, with the latter describing the flaw as residing in the SetupWizard component that’s responsible for creating an initial user and password.

“This vulnerability allows an attacker to create their own administrative user on the ScreenConnect server, giving them full control over the server,” James Horseman said. “This vulnerability follows a theme of other recent vulnerabilities that allow attackers to reinitialize applications or create initial users after setup.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • Cybersecurity Leadership in 2026: Executive Decisions that Drive Resilience and Growth
  • Implementing a Hacker’s Mindset: Build a Security Culture That Hunts, Learns, and Wins
  • The Future of Cybersecurity Leadership: Integrating Military Discipline and Strategic Thinking
  • Prioritize to Win: Optimizing Cyber Risk for Maximum Business Impact
  • Lead Before the Breach: How Executives Prevent AI-Driven Cyber Attacks

Recent Comments

No comments to show.

Archives

  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation