CVE-2024-1709
Critical
|10.0Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass authentication and gain direct access to sensitive information or critical systems in ConnectWise ScreenConnect. It affects versions 23.9.7 and earlier, meaning that if you're using these versions, your system could be at risk.
Technical Description
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$15,000($5K-$15K)
Vendor Response
Grade FPatched in 735 days
Quick Information
Published
Feb 21, 2024
about 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
connectwise
Product
screenconnect