By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: ScreenConnect critical bug now under attack as exploit code emerges
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > ScreenConnect critical bug now under attack as exploit code emerges
Tech News

ScreenConnect critical bug now under attack as exploit code emerges

By admin 4 Min Read
Share
SHARE

Both technical details and proof-of-concept exploits are available for the two vulnerabilities ConnectWise disclosed earlier this week for ScreenConnect, its remote desktop and access software.

A day after the vendor published the security issues, attackers started leveraging them in attacks.

CISA has assigned CVE-2024-1708 and CVE-2024-1709 identifiers to the the two security issues, which the vendor assessed as a maximum severity authentication bypass and a high-severity path traversal flaw that impact ScreenConnect servers 23.9.7 and earlier.

ConnectWise urged admins to update on-premise servers to version 23.9.8 immediately to mitigate the risk and clarified that those with instances on screenconnect.com cloud or hostedrmm.com have been secured.

Threat actors have compromised multiple ScreenConnect accounts, as confirmed by the company in an update to its advisory, based on incident response investigations. 

Cybersecurity company Huntress has analyzed the vulnerabilities and is warning that developing an exploit is a trivial task.

The company also stated that on Monday the Censys platform was showing more than 8,800 vulnerable ScreenConnect servers exposed. An assessment from The ShadowServer Foundation noted that yesterday the number was around 3,800.

The first working exploits emerged quickly after ConnectWise announced the two vulnerabilities and more continue to be published. This prompted Huntress to share its detailed analysis and show how easy it is to create an exploit, in the hope that companies would move faster with remediation steps.

Easy to spot and exploit

Huntress located the two flaws by looking at the code changes the vendor introduced with the patch.

For the first flaw, they found a new check in a text file indicating that authentication process wasn’t secured against all access paths, including the setup wizard (‘SetupWizard.aspx’).

This pointed to the possibility that in the vulnerable versions a specially crafted request could let users use the setup wizard even when ScreenConnect had already been set up.

Because the setup wizard allowed it, a user could create a new administrator account and use it to take control of the ScreenConnect instance.

Accessing the setup wizard arbitrarily
<strong>Accessing the setup wizard arbitrarily</strong> <em>(Huntress)</em>

Leveraging the path traversal bug is possible with the help of another specially crafted request that allows accessing or modifying files outside the intended restricted directory.

The flaw was located by noticing code changes on the ‘ScreenConnect.Core.dll’ file, pointing to ZipSlip, a vulnerability that occurs when applications don’t properly sanitize the file extraction path, which could result in overwriting sensitive files.

The updates from ConnectWise introduce stricter path validation when extracting ZIP file contents, specifically to prevent file writing outside designated subdirectories within ScreenConnect’s folder.

With administrative access from the previous exploit, it is possible to access or manipulate the User.xml file and other sensitive files by crafting requests that include directory traversal sequences to navigate the file system beyond the intended limits.

Eventually, the attacker can upload a payload, such as a malicious script or executable, outside the ScreenConnect subdirectory.

Huntress shared indicators of compromise (IoCs) and analytical detection guidance based on the artifacts created when the above flaws are exploited.

Admins who haven’t applied the security updates are strongly recommended to use the detections to check for unauthorized access.

You Might Also Like

Gemini 3 Pro Review, 7 Real-World AI Use Cases Tested to Push Its Limits

D-Link warns of new RCE flaws in end-of-life DIR-878 routers

Top tips from a senior engineering manager

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Samsung Galaxy A36 Black Friday Deal Saves You £150

TAGGED: Authentication Bypass, ConnectWise, Exploit, Exploit Chain, Path Traversal, Proof of Concept, Remote Code Execution, ScreenConnect, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Outward: Definitive Edition is Out Now on Nintendo Switch
Next Article What’s the right way to describe your interpersonal skills on a resume?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Who Is Mckenna Grace? 5 Things About the ‘Sunrise on the Reaping’ Actress
Celebrity
Zoopunk is a New Action Game by the Studio Behind F.I.S.T.: Forged in Shadow Torch
Gaming News
Golden Joystick Awards 2025 winners announced, with Clair Obscur getting GOTY
Gaming News
Intrinsic, an Alphabet company, and Nvidia supplier Foxconn will join forces to deploy AI robots in the latter’s U.S. factories
Business
Mamdani Says He Will Work With Anyone to Benefit New Yorkers Ahead of Meeting With Trump
Politics
Gemini 3 Pro Review, 7 Real-World AI Use Cases Tested to Push Its Limits
Tech News
D-Link warns of new RCE flaws in end-of-life DIR-878 routers
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Who Is Mckenna Grace? 5 Things About the ‘Sunrise on the Reaping’ Actress

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Who Is Mckenna Grace? 5 Things About the ‘Sunrise on the Reaping’ Actress
November 20, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?