CVE-2024-1709Tuesday, February 3, 2026

ConnectWise ScreenConnect Authentication Bypass Vulnerability

ConnectWise ScreenConnect (formerly ScreenConnect) versions prior to 23.9.8 contain an authentication bypass vulnerability that allows an unauthenticated attacker to execute arbitrary commands on the server and gain unauthorized access to the application.

Not KEV Listed✓ Fix Available
ConnectWise ScreenConnect Authentication Bypass Vulnerability
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

ConnectWise ScreenConnect is a remote access tool that companies use to provide technical support and manage computers from afar. A very serious security flaw was discovered that lets attackers completely bypass the login system and take control of the server running ScreenConnect.

This is particularly dangerous because an attacker doesn't need any password or username - they can simply exploit this flaw to gain full access to the system. This could let them control any computer that's connected to the ScreenConnect server, potentially affecting thousands of businesses that use this software for remote support.

Affected Products

1affected product identified
ProductVendorVersionPatched
>ScreenConnectConnectWise< 23.9.823.9.8
🔧

Remediation

Fix Available

1. Immediately upgrade to ScreenConnect version 23.9.8 or later

2. If immediate upgrade is not possible, disconnect the ScreenConnect server from the internet

3. Monitor systems for unauthorized access or suspicious activity

4. Reset all authentication credentials after upgrading

🔗

Sources & References

CVSS Score
10.0
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2024-1709
Severitycritical
FixAvailable
KEVNot Listed
PublishedFeb 3, 2026