Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown

CVE-2022-36781

Disclosure Date: September 28, 2022 (last updated September 17, 2024)
ConnectWise ScreenConnect versions 22.6 and below contained a flaw allowing potential brute force attacks on custom access tokens due to inadequate rate-limiting controls in the default configuration. Attackers could exploit this vulnerability to gain unauthorized access by repeatedly attempting access code combinations. ConnectWise has addressed this issue in later versions by implementing rate-limiting controls as a preventive measure against brute force attacks.
Attacker Value
Unknown

CVE-2021-35066

Disclosure Date: June 21, 2021 (last updated November 28, 2024)
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
Attacker Value
Unknown

CVE-2021-32582

Disclosure Date: June 17, 2021 (last updated November 28, 2024)
An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses.
Attacker Value
Unknown

CVE-2020-15838

Disclosure Date: October 09, 2020 (last updated February 22, 2025)
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
Attacker Value
Unknown

CVE-2020-15027

Disclosure Date: July 16, 2020 (last updated February 21, 2025)
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
Attacker Value
Unknown

CVE-2020-15008

Disclosure Date: July 07, 2020 (last updated February 21, 2025)
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
Attacker Value
Unknown

CVE-2020-14159

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178.
Attacker Value
Unknown

CVE-2019-16516

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a user enumeration vulnerability, allowing an unauthenticated attacker to determine with certainty if an account exists for a given username.
Attacker Value
Unknown

CVE-2019-16513

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. CSRF can be used to send API requests.
Attacker Value
Unknown

CVE-2019-16512

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is stored XSS in the Appearance modifier.