TopVuln

High-risk vulnerability digests

CVE-2024-1708

  • HIGH
  • KEV

ConnectWise ScreenConnect Path Traversal Vulnerability

Details

CVSS v3
8.4
NVD published
2024-02-21 16:15:50
CISA date
2026-04-28
EPSS
85.0% probability · 99.4th percentile — 2026-05-12
Affected versions
ConnectWise ScreenConnect versions before 23.9.7, 22.9.10, 21.9.6
Summary
This flaw exists in ConnectWise ScreenConnect, a widely used enterprise remote access and IT support tool. A path traversal vulnerability allows unauthenticated remote attackers to access files outside of the intended restricted file system path. Successful exploitation can lead to remote code execution, unauthorized access to sensitive organizational data, and full system compromise.
Remediation
Administrators should immediately apply the official security patches released by ConnectWise for all affected ScreenConnect instances. If patching cannot be done immediately, block public exposure of ScreenConnect instances and restrict access to only trusted internal IP addresses. Monitor affected systems for suspicious or unauthorized activity to detect potential exploitation attempts.
Exploit info
This exploit has been recorded in <strong>CISA KEV</strong> (CISA Known Exploited Vulnerabilities catalog, dateAdded 2026-04-28). You may check Exploit-DB or GitHub for potential exploit details.

View on NVD  ·  CISA KEV catalog

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.