CVE-2024-1709

Critical
|10.0
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to bypass authentication and gain direct access to sensitive information or critical systems in ConnectWise ScreenConnect. It affects versions 23.9.7 and earlier, meaning that if you're using these versions, your system could be at risk.

Technical Description

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$15,000($5K-$15K)
Vendor Response
Grade FPatched in 735 days

Quick Information

Published

Feb 21, 2024

about 2 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

connectwise

Product

screenconnect