Vulnerabilities - Unpatched ScreenConnect Servers Open to Attack
Basically, a flaw in ScreenConnect lets hackers take over remote sessions.
ConnectWise has patched a critical vulnerability in ScreenConnect that allows session hijacking. Organizations using this remote access tool must upgrade to protect sensitive data. Immediate action is essential to prevent exploitation.
The Flaw
ConnectWise has revealed a critical vulnerability identified as CVE-2026-3564 in its popular ScreenConnect remote access platform. This flaw arises from improper verification of cryptographic signatures, allowing attackers to exploit it remotely. The vulnerability affects all versions of ScreenConnect prior to version 26.1. Attackers can hijack sessions without needing any user interaction, making it a serious threat.
The root cause lies in how ScreenConnect stored unique ASP.NET machine keys in server configuration files. Under certain conditions, unauthorized actors could extract these keys and misuse them for session authentication. This means that once they hijack a session, they can perform unauthorized actions within the instance, including accessing employee computers and installing malware.
What's at Risk
Organizations using ScreenConnect, especially managed service providers and IT departments, are at significant risk. The ability for attackers to open remote sessions and execute commands poses a severe threat to sensitive data and operational integrity. Without proper updates, many organizations remain vulnerable to exploitation.
ConnectWise has implemented enhanced protections in ScreenConnect version 26.1, which includes encrypted storage and management of machine keys. This update significantly reduces the risk of unauthorized access, especially in scenarios where server integrity may be compromised. However, those using older versions must act quickly to mitigate potential threats.
Patch Status
ConnectWise released ScreenConnect version 26.1 last week, addressing the vulnerabilities associated with CVE-2026-3564. The company has updated the server instances it hosts in its cloud. However, customers with on-premises or self-hosted instances are strongly urged to upgrade as soon as possible.
Despite the patch, security researchers have observed attempts to exploit the disclosed ASP.NET machine key material. While ConnectWise has not confirmed any successful exploitation in its hosted version, the potential for attacks remains high. Organizations must remain vigilant and check for signs of prior compromise in their ScreenConnect logs.
Immediate Actions
To protect against this vulnerability, organizations should take several immediate actions. First, they should review instance-level and server-level access controls to restrict access to sensitive application configurations. Limiting access to backups and exported configuration archives is also crucial.
Additionally, organizations should ensure that they are using only trusted and supported extensions and regularly updating them. Monitoring for unusual authentication activity or unexpected administrative actions in the ScreenConnect logs can help identify potential breaches early. By taking these steps, organizations can safeguard their remote access capabilities and mitigate the risks associated with CVE-2026-3564.
Help Net Security