ConnectWise ScreenConnect exploited in the wild (CVE-2024-1708)
CVE-2024-1708
CVE-2024-1708: ConnectWise ScreenConnect 23.9.7 and prior path traversal leads to remote code execution. Actively exploited - update to 23.9.8 or later immediately.
Actively exploited in the wild - CVE-2024-1708 is a high-severity path traversal vulnerability in ConnectWise ScreenConnect 23.9.7 and prior that lets an authenticated attacker execute remote code or access sensitive data. With a 53.7% EPSS score and CISA KEV confirmation, patch to version 23.9.8 or later immediately.
Overview
CVE-2024-1708 is a path-traversal flaw in ConnectWise ScreenConnect (formerly ConnectWise Control) versions 23.9.7 and earlier. By manipulating file paths, an authenticated attacker with high privileges can escape restricted directories and access files outside the intended scope. This can lead to remote code execution (RCE) or direct exposure of confidential data and critical system files.
The vulnerability carries a CVSS score of 8.4 (HIGH) with a network attack vector and low attack complexity. While it requires authentication and user interaction, the low complexity and confirmed active exploitation make it an urgent threat for any organization running affected versions.
Impact on Affected Systems
- Remote Code Execution - An attacker who exploits the path traversal can execute arbitrary commands on the ScreenConnect server, potentially gaining full control.
- Data Exposure - Confidential data stored on the server, including session tokens, credentials, or customer information, may be read and exfiltrated.
- Lateral Movement - With RCE or data access, attackers can pivot to other systems within the same network environment.
Remediation and Mitigation
ConnectWise has released ScreenConnect version 23.9.8, which patches CVE-2024-1708. All organizations should update immediately:
- Upgrade to ScreenConnect 23.9.8 or later from the official vendor portal.
- If immediate patching is not possible, restrict network access to the ScreenConnect server to trusted IP ranges only.
- Review authentication logs for unusual access patterns, especially from accounts with high privileges.
- Monitor for signs of post-exploitation activity such as unexpected file writes or process launches.
Given the CISA KEV listing and high EPSS score (53.7% probability in the next 30 days), treat this as a critical-priority patch.
Security Insight
CVE-2024-1708 reflects a recurring pattern in remote access and management software: path traversal bugs in file-handling logic often become high-value targets because these tools inherently have broad system access. ConnectWise ScreenConnect, like many remote-support platforms, is a prime target for cybercriminals and ransomware groups seeking initial access. The high EPSS score indicates that exploit development has matured quickly, meaning defenders have little time to react. This incident reinforces the need for vendors to treat file-path validation in administrative interfaces as a security-critical design requirement, not just a quality-of-life fix.
For more details on recent data breaches and ransomware incidents leveraging remote access tools, see our breach reports and security news.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Metasploit Modules
Weaponized exploit code — authorized use only
The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.
Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.
| Module | Source |
|---|---|
exploit/multi/http/connectwise_screenconnect_rce_cve_2024_1709 | View source |
1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.
Related Advisories
A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Han...
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insuffici...
VA MAX 8.3.4 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter. Attackers c...
Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. Th...