Show filters
26 Total Results
Displaying 1-10 of 26
Sort by:
Attacker Value
Very High
CVE-2024-1709
Disclosure Date: February 21, 2024 (last updated February 23, 2024)
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel
vulnerability, which may allow an attacker direct access to confidential information or
critical systems.
3
Attacker Value
High
CVE-2024-1708
Disclosure Date: February 21, 2024 (last updated January 04, 2025)
ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker
the ability to execute remote code or directly impact confidential data or critical systems.
2
Attacker Value
Unknown
CVE-2023-47257
Disclosure Date: February 01, 2024 (last updated February 08, 2024)
ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.
0
Attacker Value
Unknown
CVE-2023-47256
Disclosure Date: February 01, 2024 (last updated February 08, 2024)
ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings
0
Attacker Value
Unknown
CVE-2023-25719
Disclosure Date: February 13, 2023 (last updated October 08, 2023)
ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
0
Attacker Value
Unknown
CVE-2023-25718
Disclosure Date: February 13, 2023 (last updated November 08, 2023)
In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior."
0
Attacker Value
Unknown
CVE-2023-23130
Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
0
Attacker Value
Unknown
CVE-2023-23128
Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS). The vendor's position is that two endpoints have Access-Control-Allow-Origin wildcarding to support product functionality, and that there is no risk from this behavior. The vulnerability report is thus not valid.
0
Attacker Value
Unknown
CVE-2023-23127
Disclosure Date: February 01, 2023 (last updated November 08, 2023)
In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS. NOTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
0
Attacker Value
Unknown
CVE-2023-23126
Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.
0