Authentication Vulnerability in ConnectWise ScreenConnect Software
CVE-2026-3564

9CRITICAL

Key Information:

Vendor
CVE Published:
17 March 2026

What is CVE-2026-3564?

CVE-2026-3564 is an authentication vulnerability affecting ConnectWise ScreenConnect, a remote support and access software used by IT professionals and organizations for remote monitoring, collaboration, and troubleshooting. This vulnerability arises from a condition that may allow an unauthorized actor, who gains access to server-level cryptographic materials utilized for authenticating users, to exploit the system. In certain scenarios, an attacker can obtain unauthorized access with elevated privileges, potentially compromising sensitive company data and system integrity. Given the extensive use of ScreenConnect in various organizational environments, this vulnerability poses a significant threat, as it targets the core trust mechanism of the software, enabling unauthorized manipulation and access to critical functions and information.

Potential impact of CVE-2026-3564

  1. Unauthorized Access: The vulnerability allows malicious actors to gain unauthorized entry into systems running ScreenConnect, which could enable them to access sensitive information, initiate system changes, or install malicious software.

  2. Elevation of Privileges: Attackers can exploit the vulnerability to elevate their privileges, granting them administrative control over affected systems. This level of access could lead to further exploitation, disruption of services, or the exfiltration of organization-critical data.

  3. Compliance and Reputation Risks: Organizations vulnerable to this flaw may face compliance issues, especially if sensitive customer data is jeopardized. Additionally, successful exploitation can severely damage an organization’s reputation, resulting in loss of customer trust and potential financial repercussions from data breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ScreenConnect All versions prior to 26.1

References

CVSS V3.1

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.