CVE-2024-1708
HIGH EXPLOITED IN THE WILD RANSOMWAREConnectWise ScreenConnect Unauthenticated Remote Code Execution
Title source: metasploitDescription
ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.
Exploits (3)
github
WORKING POC
1 stars
by Teexo · pythonremote
https://github.com/Teexo/ScreenConnect-CVE-2024-1709-Exploit
metasploit
WORKING POC
EXCELLENT
by sfewer-r7, WatchTowr · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb
Scores
CVSS v3
8.4
EPSS
0.5706
EPSS Percentile
98.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-02-22
InTheWild.io
2024-02-19
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (1)
connectwise/screenconnect
< 23.9.8
Published
Feb 21, 2024
Tracked Since
Feb 18, 2026