Authentication Bypass Using Alternate Path or Channel Vulnerability Affects ConnectWise ScreenConnect 23.9.7 and Prior
CVE-2024-1709
Key Information
- Vendor
- Connectwise
- Status
- Screenconnect
- Vendor
- CVE Published:
- 21 February 2024
Badges
What is CVE-2024-1709?
CVE-2024-1709 is a critical vulnerability affecting ConnectWise ScreenConnect versions 23.9.7 and earlier. This software, designed for remote support and access, allows technicians to remotely control client computers and troubleshoot issues effectively. However, the identified vulnerability presents a serious risk to organizations, as it enables an attacker to bypass authentication mechanisms. This weakness can lead to unauthorized access to confidential information and critical systems, severely compromising organizational security and data integrity.
Technical Details
The vulnerability is categorized as an "Authentication Bypass Using Alternate Path or Channel." It exploits flaws in the authentication process, allowing unauthorized users to gain access without proper credentials. Specifically, attackers can manipulate underlying authentication workflows to bypass safeguards that typically protect sensitive operations. As a result, exploiters can use this flaw to perform unauthorized actions within the Connected systems, further complicating incident response efforts.
Impact of the Vulnerability
-
Unauthorized Access: The primary impact of CVE-2024-1709 is unauthorized access to sensitive systems and data. Attackers can leverage this vulnerability to gain control over functionalities that should be restricted, leading to data breaches and compromised confidentiality.
-
Critical System Compromise: Beyond just access to sensitive data, the vulnerability can allow attackers to compromise critical systems remotely. This could result in manipulation of system operations, data theft, or system integrity issues, posing significant risks to business continuity.
-
Increased Attack Surface: As this vulnerability could be exploited by various threat actors, including cybercriminals, the existence of CVE-2024-1709 increases the overall attack surface. Organizations face a heightened risk of malware proliferation, data exfiltration, or utilization as an entry point for more sophisticated attacks, including potential ransomware deployment.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-1709 as being exploited and is known by the CISA as enabling ransomware campaigns.
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
ScreenConnect <= 23.9.7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709
ConnectWise recently reported two vulnerabilities in its ScreenConnect product, allowing threat actors to bypass authentication and execute remote code.
8 months ago
Chinese government hacker exploiting ScreenConnect, F5 bugs to attack defense and government entities
A hacker allegedly connected to the People's Republic of China (PRC) has been exploiting two popular vulnerabilities to attack U.S. defense contractors, U.K. government entities and institutions in Asia.
9 months ago
Widespread Exploitation of ConnectWise ScreenConnect Server Vulnerabilities
On February 19, 2024, ConnectWise released a security bulletin detailing the following two vulnerabilities in the self-hosted ScreenConnect server. Both vulnerabilities were reported to ConnectWise on...
10 months ago
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- π
Vulnerability started trending
- π°
Used in Ransomware
- πΎ
Exploit known to exist
- π¦
CISA Reported
- π°
First article discovered by SC Media
Vulnerability published
Vulnerability Reserved