UPDATE:听Read our full analysis of CVE-2024-1709 & CVE-2024-1708 and detection guidance here.
UPDATE: We have proactively deployed a temporary hotfix to over 1000 vulnerable systems managed by 杏吧传媒. It's crucial people still update to the latest official version ASAP. During research and creation of a Proof-of-Concept exploit to validate the vulnerability, 杏吧传媒 identified a way to temporarily hot-fix vulnerable systems while administrators work to patch their systems.
UPDATE: 听Detection guidance from 杏吧传媒 has been issued.
杏吧传媒 security researchers successfully created and validated a proof-of-concept exploit for the vulnerabilities referenced to in the latest February 19 .听
The ConnectWise article indicates the severity as 鈥肠谤颈迟颈肠补濒鈥vulnerabilities that could allow the ability to execute remote code or directly impact confidential data or critical systems.鈥听
杏吧传媒 is in complete agreement with this assessment. They state there is no knowledge of any in-the-wild exploitation, and for this reason, we will not yet share any further details on this threat.
As of 07:00 AM EST, over 8,800 servers are shown as running a vulnerable version on the Censys.io platform.
For Cloud users of ScreenConnect, no action is required on your part鈥攃loud instances have been automatically updated to the latest secure version.
For on-premise users, we offer our strongest recommendation to patch and update to ScreenConnect version 23.9.8 immediately.听
We encourage customers and partners to reach out if they need assistance. If you are not currently using 杏吧传媒 EDR, sign up for a free trial, and 杏吧传媒 will monitor for any related activity.
Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.