CVE-2024-1709
Authentication bypass using an alternate path or channel
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- February 21, 2024
- Published Date
- February 21, 2024
- Last Updated
- August 01, 2024
- Vendor
- ConnectWise
- Product
- ScreenConnect
- Description
- ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
CVSS Scores
CVSS v3.1
10.0 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
https://github.com/rapid7/metasploit-framework/pull/18870
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-02-22 00:00:00 UTC |
Recent Mentions
Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help
Source: Tenable Blog • Published: 2025-04-25 19:58:48 UTC
Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s how Tenable’s Vulnerability Watch classification system can help.BackgroundOver the past six years working in Tenable’s research organization, I’ve watched known vulnerabilities and zero-day flaws plague organizations in the immediate aftermath of disclosure or even years afterwards. Following each blog post or threat report we’ve published, I kept coming back to the same question: Why are so many organizations struggling to remediate vulnerabilities in a timely manner?As someone who followed the evolution of COVID-19 variants throughout the beginning of the pandemic, I saw that the World Health Organization (WHO) began to label new variants under a classification system as the virus began to mutate. This classification system was designed to help prioritization efforts for monitoring and research. It included accessible labels like variants of interest and variants of concern to help communicate urgency and focus global attention.I began to wonder: What if we borrowed from the same type of classification system used by the WHO and applied it to vulnerability intelligence? Numeric-based systems like the Common Vulnerability Scoring System (CVSS) and Exploit Prediction Scoring System (EPSS) provide mechanisms for prioritization based on scoring. However, they don’t always provide enough context to help decision makers. So, what if we used simple, clear and status-based terminology to communicate risks surrounding vulnerabilities in order to guide action?This led us to develop Vulnerability Watch, a classification system for vulnerabilities inspired by the WHO’s classification of COVID-19 variants. Vulnerability Watch is a small, but important part of Tenable’s Vulnerability Intelligence offering that was launched in 2024....
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb | 2025-04-29 11:01:21 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-1709.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
connectwise_screenconnect_rce_cve_2024_1709
Type: metasploit • Created: Unknown
Metasploit module for CVE-2024-1709
AMRICHASFUCK/Mass-CVE-2024-1709
Type: github • Created: 2024-10-16 08:05:35 UTC • Stars: 2
ScreenConnect AuthBypass Mass RCE
cjybao/CVE-2024-1709-and-CVE-2024-1708
Type: github • Created: 2024-04-02 04:58:38 UTC • Stars: 1
HussainFathy/CVE-2024-1709
Type: github • Created: 2024-02-23 17:26:28 UTC • Stars: 2
A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability