• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical flaws found in connectwise screenconnect software patch now

Critical Flaws Found in ConnectWise ScreenConnect Software – Patch Now

You are here: Home / General Cyber Security News / Critical Flaws Found in ConnectWise ScreenConnect Software – Patch Now
February 20, 2024

ConnectWise has introduced software updates to tackle two security flaws in its ScreenConnect remote desktop and access computer software, which include a critical bug that could help distant code execution on affected units.

The vulnerabilities, which presently deficiency CVE identifiers, are stated underneath –

  • Authentication bypass applying an alternate path or channel (CVSS score: 10.)
  • Improper limitation of a pathname to a restricted directory aka “route traversal” (CVSS rating: 8.4)

The enterprise considered the severity of the issues as critical, citing they “could allow the ability to execute remote code or straight influence confidential info or critical systems.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Both the vulnerabilities affect ScreenConnect variations 23.9.7 and prior, with fixes out there in edition 23.9.8. The flaws have been noted to the firm on February 13, 2024.

While there is no evidence that the shortcomings have been exploited in the wild, customers who are jogging self-hosted or on-premise versions are recommended to update to the most recent edition as quickly as attainable.

“ConnectWise will also deliver up-to-date versions of releases 22.4 as a result of 23.9.7 for the critical issue, but strongly propose that associates update to ScreenConnect edition 23.9.8,” ConnectWise explained.

Located this write-up intriguing? Stick to us on Twitter  and LinkedIn to read a lot more distinctive written content we put up.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «wordpress bricks theme under active attack: critical flaw impacts 25,000+ WordPress Bricks Theme Under Active Attack: Critical Flaw Impacts 25,000+ Sites
Next Post: SaaS Compliance through the NIST Cybersecurity Framework saas compliance through the nist cybersecurity framework»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.