CVE-2024-1709
Authentication bypass using an alternate path or channel
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- February 21, 2024
- Published Date
- February 21, 2024
- Last Updated
- August 01, 2024
- Vendor
- ConnectWise
- Product
- ScreenConnect
- Description
- ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-02-22 00:00:00 UTC |
Recent Mentions
Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help
Source: Tenable Blog • Published: 2025-04-25 19:58:48 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb | 2025-04-29 11:01:21 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-1709.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
connectwise_screenconnect_rce_cve_2024_1709
Type: metasploit • Created: Unknown
AMRICHASFUCK/Mass-CVE-2024-1709
Type: github • Created: 2024-10-16 08:05:35 UTC • Stars: 2
cjybao/CVE-2024-1709-and-CVE-2024-1708
Type: github • Created: 2024-04-02 04:58:38 UTC • Stars: 1
HussainFathy/CVE-2024-1709
Type: github • Created: 2024-02-23 17:26:28 UTC • Stars: 2
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
Detected by Nuclei
-
Detected by Metasploit