CVE-2024-1709

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
References
Link Resource
https://github.com/rapid7/metasploit-framework/pull/18870 Issue Tracking Patch Third Party Advisory
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc Exploit Third Party Advisory
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ Press/Media Coverage Third Party Advisory
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ Press/Media Coverage Third Party Advisory
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 Vendor Advisory
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ Third Party Advisory
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass Exploit Third Party Advisory
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 Exploit Third Party Advisory
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 Third Party Advisory
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ Press/Media Coverage Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/18870 Issue Tracking Patch Third Party Advisory
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc Exploit Third Party Advisory
https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ Press/Media Coverage Third Party Advisory
https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ Press/Media Coverage Third Party Advisory
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 Vendor Advisory
https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ Third Party Advisory
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass Exploit Third Party Advisory
https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 Exploit Third Party Advisory
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 Third Party Advisory
https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ Press/Media Coverage Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1709 US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-21 16:15

Updated : 2025-10-24 13:45


NVD link : CVE-2024-1709

Mitre link : CVE-2024-1709

CVE.ORG link : CVE-2024-1709


JSON object : View

Products Affected

connectwise

  • screenconnect
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

NVD-CWE-Other