Back

Critical Vulnerabilities in ConnectWise ScreenConnect Exploited

Severity: High (Score: 72.9)

Sources: nvd.nist.gov, www.huntress.com

Summary

ConnectWise ScreenConnect versions 23.9.7 and prior are affected by two critical vulnerabilities: CVE-2024-1708, a path traversal flaw, and CVE-2024-1709, an authentication bypass. CVE-2024-1708 allows attackers to execute arbitrary code by overwriting critical files on the server, while CVE-2024-1709 enables unauthorized access to systems. Both vulnerabilities were disclosed on February 21, 2024, with CVE-2024-1709 being actively exploited shortly thereafter. The vulnerabilities are part of the 'SlashAndGrab' exploit chain, with CVE-2024-1708 facilitating the execution of malicious payloads. Huntress researchers confirmed active exploitation of these vulnerabilities in the wild. Organizations using unpatched versions of ScreenConnect are at significant risk, with a patch available for affected systems. The vulnerabilities were added to CISA's Known Exploited Vulnerabilities catalog on April 28, 2026, indicating ongoing active exploitation. Key Points: • CVE-2024-1708 allows remote code execution via path traversal in ScreenConnect. • CVE-2024-1709 enables authentication bypass, facilitating unauthorized access. • Both vulnerabilities are actively exploited; immediate patching is essential.

Key Entities

  • Data Breach (attack_type)
  • Malware (attack_type)
  • Ransomware (attack_type)
  • SlashAndGrab (campaign)
  • ConnectWise (company)
  • CVE-2024-1708 (cve)
  • CVE-2024-1709 (cve)
  • CWE-22 - Path Traversal (cwe)
  • CWE-287 - Improper Authentication (cwe)
  • AsyncRAT (malware)
  • Cobalt Strike (malware)
  • XWorm (malware)
  • T1136.001 - Local Account (mitre_attack)
  • T1505.003 - Web Shell (mitre_attack)
  • IIS (platform)
  • Windows (platform)
  • ScreenConnect (tool)
  • Black Basta (ransomware_group)
  • Lockbit (ransomware_group)
  • Play (ransomware_group)
  • Zip Slip (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed