CriticalFebruary 25, 2026
Critical ConnectWise ScreenConnect Authentication Bypass Vulnerability Under Active Exploitation
A critical authentication bypass vulnerability in ConnectWise ScreenConnect (CVE-2024-1709) is being actively exploited in the wild. The flaw allows attackers to gain unauthorized administrative access and execute remote code on affected systems.
Information TechnologyManaged Service ProvidersHealthcareFinancial ServicesManufacturingProfessional Services
A severe authentication bypass vulnerability (CVE-2024-1709) affecting ConnectWise ScreenConnect, formerly known as ConnectWise Control, has emerged as a critical security threat with confirmed active exploitation. The vulnerability allows attackers to bypass authentication mechanisms and gain unauthorized administrative access to affected ScreenConnect instances.
The flaw affects all on-premises versions prior to 23.9.8 and cloud instances that haven't been automatically updated. Successful exploitation enables attackers to execute arbitrary code with SYSTEM/root privileges on both the ScreenConnect server and connected client endpoints. Multiple threat actors are actively scanning for and exploiting vulnerable instances, with some attacks involving ransomware deployment and data theft.
Key Findings
- A severe authentication bypass vulnerability (CVE-2024-1709) affecting ConnectWise ScreenConnect, formerly known as ConnectWise Control, has emerged as a critical security threat with confirmed active exploitation
- The vulnerability allows attackers to bypass authentication mechanisms and gain unauthorized administrative access to affected ScreenConnect instances
- The flaw affects all on-premises versions prior to 23
- 8 and cloud instances that haven't been automatically updated
Overview
ConnectWise ScreenConnect, a widely-used remote access and support solution, is affected by a critical authentication bypass vulnerability (CVE-2024-1709) that allows attackers to gain unauthorized administrative access to affected instances. The vulnerability was disclosed on February 19, 2024, and has since been observed being actively exploited by multiple threat actors.
Vulnerability Details
The authentication bypass vulnerability exists in the web interface of ScreenConnect/ConnectWise Control servers. It allows unauthenticated attackers to:
- Bypass authentication mechanisms
- Gain administrative access to the ScreenConnect instance
- Execute arbitrary code on both the server and connected endpoints
- Access sensitive data and credentials
Technical Analysis
The vulnerability stems from an improper access control implementation in the web interface. Attackers can exploit this flaw by sending specially crafted requests to bypass authentication checks and gain administrative privileges. Once authenticated, attackers can:
- Create new administrator accounts
- Access and control connected endpoints
- Execute commands with SYSTEM/root privileges
- Deploy malicious payloads across the environment
Observed Exploitation
Multiple threat actors are actively scanning for and exploiting vulnerable instances. Observed attack patterns include:
- Mass scanning for exposed ScreenConnect instances
- Automated exploitation attempts
- Deployment of ransomware and other malware
- Data exfiltration activities
Impact Assessment
The potential impact of successful exploitation is severe:
- Complete compromise of ScreenConnect server
- Unauthorized access to all connected endpoints
- Potential lateral movement within networks
- Data theft and ransomware deployment
- Business disruption and reputational damage
Recommendations
Immediate Actions
- Immediately upgrade on-premises installations to version 23.9.8 or later
- Verify cloud instances are running the latest version
- Review system logs for signs of compromise
- Reset all administrative credentials
- Implement network segmentation for ScreenConnect servers
Long-term Mitigation
- Implement strict access controls and IP allowlisting
- Enable multi-factor authentication
- Regular security assessments of remote access solutions
- Maintain current backups of critical systems
Indicators of Compromise
- Unexpected administrative account creation
- Unusual authentication patterns
- Suspicious outbound network connections
- Unexpected file modifications in ScreenConnect directories
- Unusual process execution on connected endpoints