Description Preview
Overview
- CVE ID: CVE-2024-1709
- Vendor: ConnectWise
- Product: ScreenConnect
- Affected Versions: 23.9.7 and prior
- Status: Active exploitation reported
- CVSS Score: 10 (Critical)
- Impact: High confidentiality, integrity, and availability impact
- Attack Vector: Network
- Privileges Required: None
- User Interaction: None
- Scope: Changed
Remediation
To mitigate the risks associated with CVE-2024-1709, users of ConnectWise ScreenConnect should upgrade to version 23.9.8 or later, where the vulnerability has been addressed. It is crucial for administrators to apply this patch immediately to protect their systems from potential exploitation. Regularly monitoring for updates and applying security patches promptly is recommended to maintain system security.
References
- ConnectWise Security Bulletin on ScreenConnect
- Huntress Blog on Vulnerability Reproduction
- Huntress Detection Guidance for CWE-288
- Bleeping Computer News on ConnectWise Flaw
- GitHub PoC for ConnectWise Authentication Bypass
- Metasploit Framework Pull Request
- Horizon3.ai Research on ConnectWise
- TechCrunch Article on ConnectWise Flaw
- SecurityWeek Confirmation of Active Exploitation
- Huntress Blog on Understanding the Authentication Bypass
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Feb 21, 2024
- CISA KEV Date
- Feb 22, 2024
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- ManufacturingManufacturing: Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Educational ServicesEducational Services: Low
- Public AdministrationPublic Administration: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Retail TradeRetail Trade: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- ConstructionConstruction: Low
- Finance and InsuranceFinance and Insurance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- MiningMining: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low