Latest ScreenConnect vulnerability #
On February 19, 2024, ConnectWise disclosed two serious vulnerabilities in their ScreenConnect (formerly Control) remote-access product.
The first vulnerability is an authentication bypass vulnerability. Successful exploitation of this vulnerability would allow attackers to execute arbitrary commands with full privileges on the target system. This vulnerability has been assigned a CVSS score of 10, indicating a highly critical vulnerability.
The second issue is a path-traversal vulnerability. Successful exploitation of this vulnerability would allow attackers to access restricted resources on vulnerable systems. The vendor has not disclosed what resources may be accessed when exploiting this vulnerability. This vulnerability has been assigned a CVSS score of 8.4, indicating a high severity.
Note that CVEs are not yet assigned for these vulnerabilities.
Note that there is evidence that these vulnerabilities are being actively exploited in the wild.
What is the impact? #
Successful exploitation of these vulnerabilities would allow attackers to execute arbitrary commands with full privileges on the target system, potentially leading to complete system compromise.
Are updates or workarounds available? #
ConnectWise has released an update, version 23.9.8, that fixes these issues. ConnectWise recommends that all users upgrade to this version immediately.
How do I find ScreenConnect installations with runZero? #
From the Services Inventory, use the following query to locate potentially vulnerable ConnectWise ScreenConnect systems:
vendor:ConnectWise AND (product:Control OR product:ScreenConnect)
Note the check for the former product name (“Control”).
Additional fingerprinting research is ongoing, and additional queries will be published as soon as possible.