Connectwise

Automate

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.10.2025 19:15:32
  • Zuletzt bearbeitet 29.10.2025 19:28:11

The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and sub...

  • EPSS 0.01%
  • Veröffentlicht 16.10.2025 19:15:31
  • Zuletzt bearbeitet 29.10.2025 19:33:29

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally...

  • EPSS 0.05%
  • Veröffentlicht 01.02.2024 22:15:55
  • Zuletzt bearbeitet 17.06.2025 17:15:33

ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings

  • EPSS 6.36%
  • Veröffentlicht 01.02.2024 22:15:55
  • Zuletzt bearbeitet 07.05.2025 21:15:58

ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.

  • EPSS 0.28%
  • Veröffentlicht 01.02.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:45:52

Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to b...

  • EPSS 0.17%
  • Veröffentlicht 01.02.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:45:52

Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a custom...

  • EPSS 0.43%
  • Veröffentlicht 21.06.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:11:46

An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.

  • EPSS 0.23%
  • Veröffentlicht 09.10.2020 07:15:10
  • Zuletzt bearbeitet 21.11.2024 05:06:17

The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.

  • EPSS 0.38%
  • Veröffentlicht 16.07.2020 15:15:27
  • Zuletzt bearbeitet 21.11.2024 05:04:39

ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.