{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1709","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2024-02-21T15:05:07.113Z","datePublished":"2024-02-21T15:36:03.960Z","dateUpdated":"2025-10-21T23:05:24.008Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ScreenConnect","vendor":"ConnectWise","versions":[{"changes":[{"at":"23.9.8","status":"unaffected"}],"lessThanOrEqual":"23.9.7","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel\n\n vulnerability, which may allow an attacker direct access to confidential information or \n\n<span style=\"background-color: rgb(255, 255, 255);\">critical systems.</span>"}],"value":"ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel\n\n vulnerability, which may allow an attacker direct access to confidential information or \n\ncritical systems."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288 Authentication bypass using an alternate path or channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2024-02-21T18:25:45.687Z"},"references":[{"url":"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"},{"url":"https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8"},{"url":"https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2"},{"url":"https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/"},{"url":"https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc"},{"url":"https://github.com/rapid7/metasploit-framework/pull/18870"},{"url":"https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/"},{"url":"https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/"},{"url":"https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/"},{"url":"https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass"}],"source":{"discovery":"UNKNOWN"},"title":"Authentication bypass using an alternate path or channel","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-1709","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-02-24T05:00:21.568850Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-02-22","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1709"}}}],"affected":[{"cpes":["cpe:2.3:a:connectwise:screenconnect:-:*:*:*:*:*:*:*"],"vendor":"connectwise","product":"screenconnect","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"23.9.7"}],"defaultStatus":"unaffected"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1709","tags":["government-resource"]}],"timeline":[{"time":"2024-02-22T00:00:00.000Z","lang":"en","value":"CVE-2024-1709 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:24.008Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:21.899Z"},"title":"CVE Program Container","references":[{"url":"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8","tags":["x_transferred"]},{"url":"https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8","tags":["x_transferred"]},{"url":"https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2","tags":["x_transferred"]},{"url":"https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/","tags":["x_transferred"]},{"url":"https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc","tags":["x_transferred"]},{"url":"https://github.com/rapid7/metasploit-framework/pull/18870","tags":["x_transferred"]},{"url":"https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/","tags":["x_transferred"]},{"url":"https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/","tags":["x_transferred"]},{"url":"https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/","tags":["x_transferred"]},{"url":"https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass","tags":["x_transferred"]}]}]}}