Open Nav
Sign Up

ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1709 and CVE-2024-1708)

Bar Refael

February 26, 2024

Sophos X-Ops has identified a concerning trend in the exploitation of critical vulnerabilities within ConnectWise ScreenConnect, a widely utilized remote monitoring and management software. Two vulnerabilities, CVE-2024-1709 and CVE-2024-1708, have been disclosed, posing significant risks to organizations using older versions of ScreenConnect. Immediate action is required to mitigate the threat of remote code execution and data breaches.

Vulnerability Details:

  • CVE-2024-1709: Authentication bypass with a CVSS score of 10 (Critical).
  • CVE-2024-1708: Path traversal with a CVSS score of 8.4 (High).

Threat Landscape:

Active exploitation of these vulnerabilities has been observed, leading to the deployment of various malware strains, including LockBit ransomware and AsyncRAT. The severity of these attacks highlights the urgent need for organizations to patch their installations and enhance their network defenses.

Recommendations:

  • Patch Immediately: Upgrade to ScreenConnect version 23.9.8 or later to address the vulnerabilities.
  • Proactive Threat Hunting: Conduct thorough reviews of system logs and network traffic for signs of compromise.
  • Enhance Network Defenses: Implement additional security measures such as firewalls, intrusion detection systems, and regular vulnerability scanning.

Conclusion:

The discovery of CVE-2024-1709 and CVE-2024-1708 underscores the importance of maintaining up-to-date software and vigilant cybersecurity practices. Organizations using ConnectWise ScreenConnect must take immediate action to protect their systems and data from potential exploitation.

Stay Secure. Stay Informed.

OP Innovate Research Team.

Resources highlights

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The…

Read more >

CVE-2025-54309

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033
Under Cyber Attack?

Fill out the form and we will contact you immediately.