ConnectWise issued a security advisory urging all ScreenConnect server admins to apply patches immediately to mitigate a severe authentication bypass vulnerability, that allows for remote code execution, as well as a path traversal vulnerability. Initially, the flaws didn’t have CVEs and were identified by CWE numbers. Now that the vulnerabilities are being massively exploited, they are being tracked as CVE-2024-1709 and CVE-2024-1708.
CVE-2024-1709 is the authentication bypass flaw that is easy for attackers to exploit, while CVE-2024-1708 is the path-traversal flaw that allows attackers to remotely plant malicious code on vulnerable ConnectWise customer instances. The vulnerabilities impact ScreenConnect 23.9.7 and earlier versions. ConnectWise is recommending that all on-premise partners update to ScreenConnect version 23.9.8 to safeguard against potential attacks. Cloud servers hosted on screenconnect.com or hostedrmm.com are already secured.
Threat actors exploiting the vulnerabilities include Black Basta and Bloody ransomware. Last week, the company lifted all license restrictions, allowing customers with expired licenses to safeguard their servers against ongoing attacks, particularly since these two security vulnerabilities affect all versions of ScreenConnect. On Thursday, CISA included CVE-2024-1709 in its Known Exploited Vulnerabilities Catalog, directing U.S. federal agencies to secure their servers by February 29. Avertium highly recommends that organizations follow the patch guidance from our original flash notice below.
Atomic IoCs:
IoCs that could Indicate compromise:
overview
ConnectWise has issued a security advisory urging all ScreenConnect server admins to apply patches immediately to mitigate a severe Remote Code Execution (RCE) vulnerability. The vulnerability has a maximum security rating and stems from an authentication bypass weakness, enabling attackers to execute arbitrary code or access sensitive data remotely without user interaction.
The vulnerabilities affect ScreenConnect 23.9.7 and earlier versions, with CWE IDs for Authentication bypass (CWE-288) and Path traversal (CWE-22). While there is currently no evidence of exploitation in the wild, ConnectWise is recommending that all on-premise partners update to ScreenConnect version 23.9.8 to safeguard against potential attacks. Cloud servers hosted on screenconnect.com or hostedrmm.com are already secured.
Huntress researchers have already developed a proof-of-concept exploit, and Censys states that there are over 8,800 vulnerable servers, with Shodan identifying over 7,600 servers, of which only 160 are running the patched version. Avertium recommends that organizations using ConnectWise patch immediately to ensure safety.
INDICATORS OF COMPROMISE (IoCs)
At this time, there are no known IoCs associated with the ScreenConnect vulnerability. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
SUPPORTING DOCUMENTATION
Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! - Help Net Security
Detection Guidance for ConnectWise CWE-288 (huntress.com)
connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
ConnectWise urges ScreenConnect admins to patch critical RCE flaw (bleepingcomputer.com)
Change Healthcare Cyberattack: Network Connectivity Issues, Indicators of Compromise | AHA