Lucene search

K
ConnectwiseAutomate

7 matches found

CVE
CVE
added 2020/10/09 7:15 a.m.48 views

CVE-2020-15838

The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.

8.8CVSS8.6AI score0.00226EPSS
CVE
CVE
added 2021/06/21 8:15 p.m.43 views

CVE-2021-35066

An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.

9.8CVSS9.3AI score0.00428EPSS
CVE
CVE
added 2023/02/01 2:15 p.m.39 views

CVE-2023-23126

Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.

6.1CVSS6.2AI score0.00102EPSS
CVE
CVE
added 2023/02/01 2:15 p.m.36 views

CVE-2023-23130

Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) dur...

5.9CVSS5.7AI score0.00045EPSS
CVE
CVE
added 2024/02/01 10:15 p.m.34 views

CVE-2023-47257

ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.

8.1CVSS8.3AI score0.04963EPSS
CVE
CVE
added 2024/02/01 10:15 p.m.33 views

CVE-2023-47256

ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings

5.5CVSS5.5AI score0.00052EPSS
CVE
CVE
added 2020/07/16 3:15 p.m.27 views

CVE-2020-15027

ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.

9.8CVSS9.4AI score0.00383EPSS