ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker
the ability to execute remote code or directly impact confidential data or critical systems.
References
| Link | Resource |
|---|---|
| https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 | Vendor Advisory |
| https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass | Exploit Third Party Advisory |
| https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 | Vendor Advisory |
| https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1708 | US Government Resource Third Party Advisory |
| https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/ | Technical Description |
Configurations
History
28 Apr 2026, 21:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1708 - US Government Resource, Third Party Advisory | |
| References | () https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/ - Technical Description |
28 Apr 2026, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 08:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 - Vendor Advisory | |
| References | () https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass - Exploit, Third Party Advisory |
22 Feb 2024, 15:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Connectwise screenconnect
Connectwise |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
| CWE | CWE-22 | |
| CPE | cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:* | |
| References | () https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass - Exploit, Third Party Advisory | |
| References | () https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 - Vendor Advisory |
21 Feb 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Feb 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-21 16:15
Updated : 2026-04-28 21:44
NVD link : CVE-2024-1708
Mitre link : CVE-2024-1708
CVE.ORG link : CVE-2024-1708
JSON object : View
Products Affected
connectwise
- screenconnect
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
