2024-02-21 19:02:29 +00:00
id : CVE-2024-1709
2024-02-21 10:41:25 +00:00
info :
2024-02-22 07:45:54 +00:00
name : ConnectWise ScreenConnect 23.9.7 - Authentication Bypass
2024-02-21 10:41:25 +00:00
author : johnk3r
2024-02-21 10:45:42 +00:00
severity : critical
2024-02-22 07:45:54 +00:00
description : |
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
2024-02-21 10:41:25 +00:00
reference :
- https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
- https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
2024-02-21 10:45:42 +00:00
- https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
2024-02-22 07:45:54 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2024-1709
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2024-03-23 09:28:19 +00:00
cvss-score : 10
2024-02-22 07:45:54 +00:00
cve-id : CVE-2024-1709
cwe-id : CWE-288
2024-02-21 10:41:25 +00:00
metadata :
verified : true
max-request : 1
vendor : connectwise
product : screenconnect
shodan-query : http.favicon.hash:-82958153
2024-02-26 07:52:46 +00:00
fofa-query : app="ScreenConnect-Remote-Support-Software"
zoomeye-query : app:"ScreenConnect Remote Management Software"
hunter-query : app.name="ConnectWise ScreenConnect software"
2024-02-24 10:19:04 +00:00
tags : cve,cve2024,screenconnect,connectwise,auth-bypass,kev
2024-02-21 10:58:31 +00:00
variables :
string : "{{rand_text_alpha(10)}}"
2024-02-21 10:41:25 +00:00
http :
- method : GET
path :
2024-02-21 10:58:31 +00:00
- "{{BaseURL}}/SetupWizard.aspx/{{string}}"
2024-02-21 10:41:25 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
2024-02-21 10:58:31 +00:00
- "SetupWizardPage"
- "ContentPanel SetupWizard"
2024-02-21 10:41:25 +00:00
condition : and
- type : status
status :
- 200
extractors :
- type : kval
part : header
kval :
- Server
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100df42d248b92130b0997228abe4ff00197ca95319ec494fcb457e36f99947b38b022100f14f62eb21d2dc5ebb6f7d9b2e3df0501572ace6e67a5cad42153418c3fae0b9:922c64590222798bb761d5b6d8e72950