CVE-2024-1709
CRITICAL KEV RANSOMWARE NUCLEIConnectwise Screenconnect < 23.9.8 - Authentication Bypass
Title source: ruleDescription
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Exploits (9)
nomisec
WORKING POC
105 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE
github
WORKING POC
2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/ConnectWiseScreenConnect_CVE-2024-1709
nomisec
WORKING POC
2 stars
by AMRICHASFUCK · remote
https://github.com/AMRICHASFUCK/Mass-CVE-2024-1709
nomisec
WORKING POC
1 stars
by Teexo · remote
https://github.com/Teexo/ScreenConnect-CVE-2024-1709-Exploit
nomisec
WORKING POC
1 stars
by cjybao · remote
https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708
nomisec
WORKING POC
1 stars
by sxyrxyy · remote
https://github.com/sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass
nomisec
NO CODE
by AhmedMansour93 · poc
https://github.com/AhmedMansour93/Event-ID-229-Rule-Name-SOC262-CVE-2024-1709-
vulncheck_xdb
WORKING POC
remote
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
Nuclei Templates (1)
ConnectWise ScreenConnect 23.9.7 - Authentication Bypass
CRITICALVERIFIEDby johnk3r
Shodan:
http.favicon.hash:-82958153
FOFA:
app="ScreenConnect-Remote-Support-Software" || app="screenconnect-remote-support-software" || icon_hash=-82958153
References (11)
Scores
CVSS v3
10.0
EPSS
0.9432
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CISA KEV
2024-02-22
VulnCheck KEV
2024-02-20
InTheWild.io
2024-02-19
ENISA EUVD
EUVD-2024-17443
Ransomware Use
Confirmed
CWE
CWE-288
Status
published
Products (1)
connectwise/screenconnect
< 23.9.8
Published
Feb 21, 2024
KEV Added
Feb 22, 2024
Tracked Since
Feb 18, 2026