
CVE-2024-1709 – ConnectWise ScreenConnect Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-1709
21 Feb 2024 — ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. ConnectWise ScreenConnect 23.9.7 y versiones anteriores se ven afectados por una vulnerabilidad de omisión de autenticación mediante una ruta o canal alternativo, que puede permitir a un atacante acceder directamente a información confidencial o sistemas críticos. ConnectWise ScreenConn... • https://packetstorm.news/files/id/177255 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVE-2024-1708 – Improper limitation of a pathname to a restricted directory (“path traversal”)
https://notcve.org/view.php?id=CVE-2024-1708
21 Feb 2024 — ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. ConnectWise ScreenConnect 23.9.7 y versiones anteriores se ven afectados por una vulnerabilidad de path traversal, que puede permitir a un atacante ejecutar código remoto o afectar directamente a datos confidenciales o sistemas críticos. • https://packetstorm.news/files/id/177255 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-47256
https://notcve.org/view.php?id=CVE-2023-47256
01 Feb 2024 — ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings ConnectWise ScreenConnect hasta 23.8.4 permite a los usuarios locales conectarse a servidores de retransmisión arbitrarios mediante la confianza implícita en la configuración del proxy • https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 • CWE-287: Improper Authentication •

CVE-2023-47257
https://notcve.org/view.php?id=CVE-2023-47257
01 Feb 2024 — ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages. ConnectWise ScreenConnect hasta la versión 23.8.4 permite a atacantes de man in the middle lograr la ejecución remota de código a través de mensajes manipulados. • https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-25718
https://notcve.org/view.php?id=CVE-2023-25718
13 Feb 2023 — In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: th... • https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2023-25719
https://notcve.org/view.php?id=CVE-2023-25719
13 Feb 2023 — ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files tha... • https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2023-23126
https://notcve.org/view.php?id=CVE-2023-23126
01 Feb 2023 — Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack. • https://github.com/l00neyhacker/CVE-2023-23126 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2023-23127
https://notcve.org/view.php?id=CVE-2023-23127
01 Feb 2023 — In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS. NOTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. • https://github.com/l00neyhacker/CVE-2023-23127 • CWE-311: Missing Encryption of Sensitive Data •

CVE-2023-23128
https://notcve.org/view.php?id=CVE-2023-23128
01 Feb 2023 — Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS). The vendor's position is that two endpoints have Access-Control-Allow-Origin wildcarding to support product functionality, and that there is no risk from this behavior. The vulnerability report is thus not valid. • https://github.com/l00neyhacker/CVE-2023-23128 • CWE-942: Permissive Cross-domain Policy with Untrusted Domains •

CVE-2023-23130
https://notcve.org/view.php?id=CVE-2023-23130
01 Feb 2023 — Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. • https://github.com/l00neyhacker/CVE-2023-23130 • CWE-319: Cleartext Transmission of Sensitive Information •