Critical ConnectWise ScreenConnect Authentication Bypass Vulnerability Under Active Exploitation
CriticalFebruary 25, 2026

Critical ConnectWise ScreenConnect Authentication Bypass Vulnerability Under Active Exploitation

A critical authentication bypass vulnerability in ConnectWise ScreenConnect (CVE-2024-1709) is being actively exploited in the wild. The flaw allows attackers to gain unauthorized administrative access and execute remote code on affected systems.

Information TechnologyManaged Service ProvidersHealthcareFinancial ServicesManufacturingProfessional Services
📈

Executive Summary

A severe authentication bypass vulnerability (CVE-2024-1709) affecting ConnectWise ScreenConnect, formerly known as ConnectWise Control, has emerged as a critical security threat with confirmed active exploitation. The vulnerability allows attackers to bypass authentication mechanisms and gain unauthorized administrative access to affected ScreenConnect instances. The flaw affects all on-premises versions prior to 23.9.8 and cloud instances that haven't been automatically updated. Successful exploitation enables attackers to execute arbitrary code with SYSTEM/root privileges on both the ScreenConnect server and connected client endpoints. Multiple threat actors are actively scanning for and exploiting vulnerable instances, with some attacks involving ransomware deployment and data theft.

Key Findings
  • A severe authentication bypass vulnerability (CVE-2024-1709) affecting ConnectWise ScreenConnect, formerly known as ConnectWise Control, has emerged as a critical security threat with confirmed active exploitation
  • The vulnerability allows attackers to bypass authentication mechanisms and gain unauthorized administrative access to affected ScreenConnect instances
  • The flaw affects all on-premises versions prior to 23
  • 8 and cloud instances that haven't been automatically updated

Overview

ConnectWise ScreenConnect, a widely-used remote access and support solution, is affected by a critical authentication bypass vulnerability (CVE-2024-1709) that allows attackers to gain unauthorized administrative access to affected instances. The vulnerability was disclosed on February 19, 2024, and has since been observed being actively exploited by multiple threat actors.

Vulnerability Details

The authentication bypass vulnerability exists in the web interface of ScreenConnect/ConnectWise Control servers. It allows unauthenticated attackers to:

  • Bypass authentication mechanisms
  • Gain administrative access to the ScreenConnect instance
  • Execute arbitrary code on both the server and connected endpoints
  • Access sensitive data and credentials

Technical Analysis

The vulnerability stems from an improper access control implementation in the web interface. Attackers can exploit this flaw by sending specially crafted requests to bypass authentication checks and gain administrative privileges. Once authenticated, attackers can:

  • Create new administrator accounts
  • Access and control connected endpoints
  • Execute commands with SYSTEM/root privileges
  • Deploy malicious payloads across the environment

Observed Exploitation

Multiple threat actors are actively scanning for and exploiting vulnerable instances. Observed attack patterns include:

  • Mass scanning for exposed ScreenConnect instances
  • Automated exploitation attempts
  • Deployment of ransomware and other malware
  • Data exfiltration activities

Impact Assessment

The potential impact of successful exploitation is severe:

  • Complete compromise of ScreenConnect server
  • Unauthorized access to all connected endpoints
  • Potential lateral movement within networks
  • Data theft and ransomware deployment
  • Business disruption and reputational damage

Recommendations

Immediate Actions

  • Immediately upgrade on-premises installations to version 23.9.8 or later
  • Verify cloud instances are running the latest version
  • Review system logs for signs of compromise
  • Reset all administrative credentials
  • Implement network segmentation for ScreenConnect servers

Long-term Mitigation

  • Implement strict access controls and IP allowlisting
  • Enable multi-factor authentication
  • Regular security assessments of remote access solutions
  • Maintain current backups of critical systems

Indicators of Compromise

  • Unexpected administrative account creation
  • Unusual authentication patterns
  • Suspicious outbound network connections
  • Unexpected file modifications in ScreenConnect directories
  • Unusual process execution on connected endpoints
Information TechnologyManaged Service ProvidersHealthcareFinancial ServicesManufacturingProfessional Services
ConnectWiseScreenConnectAuthentication BypassRemote Code ExecutionCVE-2024-1709Remote AccessActive Exploitation
📅February 25, 2026
🕒1h ago
🔗2 sources

Related Briefs

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories
CriticalFeb 25, 2026

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories

Multiple malicious packages discovered in PyPI and npm repositories executing credential theft and crypto mining payloads. Supply chain attacks leverage typosquatting and dependency confusion techniques to compromise development environments.

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure
CriticalFeb 25, 2026

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure

Chinese state-sponsored threat actor Salt Typhoon (aka Bronze Silhouette) conducts persistent intrusion campaign against US telecommunications providers. The group employs sophisticated living-off-the-land techniques and custom malware to maintain long-term access to critical infrastructure.

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure
CriticalFeb 10, 2026

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure

Large-scale ransomware campaign exploiting VMware ESXi vulnerabilities to encrypt virtual machines and disrupt business operations. Attackers leverage CVE-2021-21974 to compromise unpatched systems globally.