CVE-2024-1709

CRITICAL
2024-02-21 9119a7d8-5eab-497f-8521-727c672e3725
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:20 vuln.today
Patch Released
Feb 26, 2026 - 15:04 nvd
Patch available
PoC Detected
Feb 26, 2026 - 15:04 vuln.today
Public exploit code
Added to CISA KEV
Feb 26, 2026 - 15:04 cisa
CISA KEV
CVE Published
Feb 21, 2024 - 16:15 nvd
CRITICAL 10.0

Description

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

Analysis

ConnectWise ScreenConnect contains a critical authentication bypass (CVSS 10.0) that allows direct access to the administrative interface, mass-exploited within hours of disclosure for ransomware deployment.

Technical Context

The CWE-288 authentication bypass allows attackers to access the initial setup wizard even after ScreenConnect has been configured. This provides the ability to create new administrator accounts, modify server configuration, and execute code on all connected endpoints.

Affected Products

['ConnectWise ScreenConnect 23.9.7 and prior']

Remediation

Update ScreenConnect immediately to 23.9.8+. ConnectWise cloud-hosted instances were auto-patched. On-premise instances require manual update. Audit for unauthorized admin accounts. Check all managed endpoints for compromise.

Priority Score

224
Low Medium High Critical
KEV: +50
EPSS: +94.3
CVSS: +50
POC: +20

Share

CVE-2024-1709 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy