Blog

Remediation and Hardening Guide for ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709)

Mandiant
Feb 23, 2024
1 min read
|   Last updated: Feb 27, 2024
Remediation
Vulnerabilities

On Feb. 19, 2024, ConnectWise announced two vulnerabilities for their ScreenConnect product affecting (on-premises) versions 23.9.7 and earlier:

These vulnerabilities allow an unauthenticated actor to bypass authentication, and access ScreenConnect environments that may be behind a corporate firewall. 

ConnectWise released an updated version of the ScreenConnect product (23.9.8+) that mitigates the vulnerabilities. ConnectWise has removed license restrictions so ScreenConnect consumers who no longer have a maintenance subscription can update their software.

For organizations with a cloud-based controller, no action is required as ConnectWise has applied the necessary patches. For organizations with an on-premises controller, Mandiant is providing a remediation and hardening guide for additional steps to reduce risks related to these vulnerabilities.

Mandiant has identified mass exploitation of these vulnerabilities by various threat actors. Many of them will deploy ransomware and conduct multifaceted extortion.

Read our remediation and hardening guide now to protect against this threat.