id: CVE-2024-1709 info: name: ConnectWise ScreenConnect 23.9.7 - Authentication Bypass author: johnk3r severity: critical description: | ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. reference: - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc - https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 - https://nvd.nist.gov/vuln/detail/CVE-2024-1709 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2024-1709 cwe-id: CWE-288 metadata: verified: true max-request: 1 vendor: connectwise product: screenconnect shodan-query: http.favicon.hash:-82958153 fofa-query: app="ScreenConnect-Remote-Support-Software" zoomeye-query: app:"ScreenConnect Remote Management Software" hunter-query: app.name="ConnectWise ScreenConnect software" tags: cve,cve2024,screenconnect,connectwise,auth-bypass,kev variables: string: "{{rand_text_alpha(10)}}" http: - method: GET path: - "{{BaseURL}}/SetupWizard.aspx/{{string}}" matchers-condition: and matchers: - type: word part: body words: - "SetupWizardPage" - "ContentPanel SetupWizard" condition: and - type: status status: - 200 extractors: - type: kval part: header kval: - Server # digest: 4b0a00483046022100df42d248b92130b0997228abe4ff00197ca95319ec494fcb457e36f99947b38b022100f14f62eb21d2dc5ebb6f7d9b2e3df0501572ace6e67a5cad42153418c3fae0b9:922c64590222798bb761d5b6d8e72950