connectwise CVE Vulnerabilities & Metrics

Focus on connectwise vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About connectwise Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with connectwise. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total connectwise CVEs: 25
Earliest CVE date: 31 Jul 2017, 23:29 UTC
Latest CVE date: 21 Feb 2024, 16:15 UTC

Latest CVE reference: CVE-2024-1709

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical connectwise CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.47

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 9
7.0-8.9 4
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS connectwise CVEs

These are the five CVEs with the highest CVSS scores for connectwise, sorted by severity first and recency.

All CVEs for connectwise

CVE-2024-1709 connectwise vulnerability CVSS: 0 21 Feb 2024, 16:15 UTC

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

CVE-2024-1708 connectwise vulnerability CVSS: 0 21 Feb 2024, 16:15 UTC

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

CVE-2023-47257 connectwise vulnerability CVSS: 0 01 Feb 2024, 22:15 UTC

ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.

CVE-2023-47256 connectwise vulnerability CVSS: 0 01 Feb 2024, 22:15 UTC

ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings

CVE-2023-25719 connectwise vulnerability CVSS: 0 13 Feb 2023, 20:15 UTC

ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).

CVE-2023-25718 connectwise vulnerability CVSS: 0 13 Feb 2023, 20:15 UTC

In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior."

CVE-2023-23130 connectwise vulnerability CVSS: 0 01 Feb 2023, 14:15 UTC

Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.

CVE-2023-23128 connectwise vulnerability CVSS: 0 01 Feb 2023, 14:15 UTC

Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS). The vendor's position is that two endpoints have Access-Control-Allow-Origin wildcarding to support product functionality, and that there is no risk from this behavior. The vulnerability report is thus not valid.

CVE-2023-23127 connectwise vulnerability CVSS: 0 01 Feb 2023, 14:15 UTC

In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS. NOTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.

CVE-2023-23126 connectwise vulnerability CVSS: 0 01 Feb 2023, 14:15 UTC

Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.

CVE-2022-36781 connectwise vulnerability CVSS: 0 28 Sep 2022, 20:15 UTC

ConnectWise ScreenConnect versions 22.6 and below contained a flaw allowing potential brute force attacks on custom access tokens due to inadequate rate-limiting controls in the default configuration. Attackers could exploit this vulnerability to gain unauthorized access by repeatedly attempting access code combinations. ConnectWise has addressed this issue in later versions by implementing rate-limiting controls as a preventive measure against brute force attacks.

CVE-2021-35066 connectwise vulnerability CVSS: 7.5 21 Jun 2021, 20:15 UTC

An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.

CVE-2021-32582 connectwise vulnerability CVSS: 5.0 17 Jun 2021, 12:15 UTC

An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses.

CVE-2020-15838 connectwise vulnerability CVSS: 6.5 09 Oct 2020, 07:15 UTC

The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.

CVE-2020-15027 connectwise vulnerability CVSS: 7.5 16 Jul 2020, 15:15 UTC

ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.

CVE-2020-15008 connectwise vulnerability CVSS: 6.0 07 Jul 2020, 20:15 UTC

A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.

CVE-2019-16517 connectwise vulnerability CVSS: 7.5 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a CORS misconfiguration, which reflected the Origin provided by incoming requests. This allowed JavaScript running on any domain to interact with the server APIs and perform administrative actions, without the victim's knowledge.

CVE-2019-16516 connectwise vulnerability CVSS: 5.0 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a user enumeration vulnerability, allowing an unauthenticated attacker to determine with certainty if an account exists for a given username.

CVE-2019-16515 connectwise vulnerability CVSS: 6.4 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. Certain HTTP security headers are not used.

CVE-2019-16514 connectwise vulnerability CVSS: 6.5 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server.

CVE-2019-16513 connectwise vulnerability CVSS: 6.8 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. CSRF can be used to send API requests.

CVE-2019-16512 connectwise vulnerability CVSS: 3.5 23 Jan 2020, 18:15 UTC

An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is stored XSS in the Appearance modifier.

CVE-2017-18362 connectwise vulnerability CVSS: 7.5 05 Feb 2019, 06:29 UTC

ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.

CVE-2017-11727 connectwise vulnerability CVSS: 4.3 31 Jul 2017, 23:29 UTC

services/system_io/actionprocessor/Contact.rails in ConnectWise Manage 2017.5 allows arbitrary client-side JavaScript code execution (involving a ContactCommon field) on victims who click on a crafted link, aka XSS.

CVE-2017-11726 connectwise vulnerability CVSS: 6.8 31 Jul 2017, 23:29 UTC

services/system_io/actionprocessor/System.rails in ConnectWise Manage 2017.5 is vulnerable to Cross-Site Request Forgery (CSRF), as demonstrated by changing an e-mail address setting.