.. / CVE-2024-1709

Exploit for ConnectWise ScreenConnect <= 23.9.7 - Authentication Bypass (CVE-2024-1709)

Description:

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

Affected Products:

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2024-1709.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-1709.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2024-1709
https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
https://github.com/rapid7/metasploit-framework/pull/18870