85.0% probability · 99.4th percentile — 2026-05-12
Affected versions
ConnectWise ScreenConnect versions before 23.9.7, 22.9.10, 21.9.6
Summary
This flaw exists in ConnectWise ScreenConnect, a widely used enterprise remote access and IT support tool. A path traversal vulnerability allows unauthenticated remote attackers to access files outside of the intended restricted file system path. Successful exploitation can lead to remote code execution, unauthorized access to sensitive organizational data, and full system compromise.
Remediation
Administrators should immediately apply the official security patches released by ConnectWise for all affected ScreenConnect instances. If patching cannot be done immediately, block public exposure of ScreenConnect instances and restrict access to only trusted internal IP addresses. Monitor affected systems for suspicious or unauthorized activity to detect potential exploitation attempts.
Exploit info
This exploit has been recorded in <strong>CISA KEV</strong> (CISA Known Exploited Vulnerabilities catalog, dateAdded 2026-04-28). You may check Exploit-DB or GitHub for potential exploit details.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.