Show filters
26 Total Results
Displaying 1-10 of 26
Sort by:
Attacker Value
Very High

CVE-2024-1709

Disclosure Date: February 21, 2024 (last updated February 23, 2024)
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Attacker Value
High

CVE-2024-1708

Disclosure Date: February 21, 2024 (last updated January 04, 2025)
ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.
Attacker Value
Unknown

CVE-2023-47257

Disclosure Date: February 01, 2024 (last updated February 08, 2024)
ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.
Attacker Value
Unknown

CVE-2023-47256

Disclosure Date: February 01, 2024 (last updated February 08, 2024)
ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings
Attacker Value
Unknown

CVE-2023-25719

Disclosure Date: February 13, 2023 (last updated October 08, 2023)
ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
Attacker Value
Unknown

CVE-2023-25718

Disclosure Date: February 13, 2023 (last updated November 08, 2023)
In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior."
Attacker Value
Unknown

CVE-2023-23130

Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
Attacker Value
Unknown

CVE-2023-23128

Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS). The vendor's position is that two endpoints have Access-Control-Allow-Origin wildcarding to support product functionality, and that there is no risk from this behavior. The vulnerability report is thus not valid.
Attacker Value
Unknown

CVE-2023-23127

Disclosure Date: February 01, 2023 (last updated November 08, 2023)
In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS. NOTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
Attacker Value
Unknown

CVE-2023-23126

Disclosure Date: February 01, 2023 (last updated November 08, 2023)
Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.