Article Details
Scrape Timestamp (UTC): 2024-02-20 10:46:34.383
Source: https://thehackernews.com/2024/02/critical-flaws-found-in-connectwise.html
Original Article Text
Click to Toggle View
Critical Flaws Found in ConnectWise ScreenConnect Software - Patch Now. ConnectWise has released software updates to address two security flaws in its ScreenConnect remote desktop and access software, including a critical bug that could enable remote code execution on affected systems. The vulnerabilities, which currently lack CVE identifiers, are listed below - The company deemed the severity of the issues as critical, citing they "could allow the ability to execute remote code or directly impact confidential data or critical systems." Both the vulnerabilities impact ScreenConnect versions 23.9.7 and prior, with fixes available in version 23.9.8. The flaws were reported to the company on February 13, 2024. While there is no evidence that the shortcomings have been exploited in the wild, users who are running self-hosted or on-premise versions are recommended to update to the latest version as soon as possible. "ConnectWise will also provide updated versions of releases 22.4 through 23.9.7 for the critical issue, but strongly recommend that partners update to ScreenConnect version 23.9.8," ConnectWise said. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
ConnectWise has updated ScreenConnect to fix two critical security vulnerabilities.
Affected software versions are 23.9.7 and earlier; version 23.9.8 contains the necessary fixes.
The severe flaws could potentially allow remote code execution and data breaches.
No current evidence suggests these vulnerabilities have been exploited in the wild.
Vulnerabilities were disclosed to ConnectWise on February 13, 2024.
ConnectWise urges users of on-premise or self-hosted versions to install updates immediately.
The company is also providing patches for releases 22.4 through 23.9.7 but recommends upgrading to the latest version.
The security flaws currently do not have assigned CVE identifiers.