On February 19, 2024, ConnectWise released a security bulletin reporting two vulnerabilities: CVE-2024-1709 and CVE-2024-1708. Both vulnerabilities affect the ScreenConnect On-Premise Product. Cloud-based ScreenConnect products were updated automatically by ConnectWise. When exploited, they allow an attacker to bypass authentication or traverse remote directories potentially accessing files. These vulnerabilities affect ScreenConnect versions 23.9.7 and prior. The Cybersecurity Infrastructure & Security Agency (CISA) added CVE-2024-1709 to the Known Exploited Vulnerabilities Catalog indicating this vulnerability is being exploited by adversaries.
ConnectWise recommends the following actions to mitigate the vulnerabilities:
In addition to performing the recommended actions from ConnectWise, potentially impacted organizations should take the following precautions as part of their incident response process:
Note: The following response steps should be performed before upgrading the vulnerable products to avoid overwriting pertinent artifacts. Once the artifacts are preserved, continue with upgrading the vulnerable products.
IoCs reported by ConnectWise:
Additional steps for mitigation if abnormal access is identified:
Additional Resources
Check out IronGate’s Digital Forensics and Incident Response capabilities:
|
Steve Ramey has spent the past two decades helping clients protect, investigate, and respond to events involving their digital interests. He has led hundreds of data breach investigations, assessed incident response and security programs, and successfully advised organizations through extortion negotiations. |