10

CVE-2024-1709

Warnung
Medienbericht
Exploit
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel

 vulnerability, which may allow an attacker direct access to confidential information or 

critical systems.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ConnectwiseScreenconnect Version < 23.9.8

22.02.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

ConnectWise ScreenConnect Authentication Bypass Vulnerability

Schwachstelle

ConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.32% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9119a7d8-5eab-497f-8521-727c672e3725 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

https://github.com/rapid7/metasploit-framework/pull/18870
Patch
Third Party Advisory
Issue Tracking