Supply chain ⛓ Supply Chain

ConnectWise ScreenConnect CVE-2024-1709 Auth Bypass — Mass Exploitation by Multiple Threat Actors

📅 2024-02-19 🏢 ConnectWise ScreenConnect (remote access / remote desktop tool for MSPs) 🦠 LockBit ransomware, Bl00dy ransomware, various RATs and backdoors deployed by multiple threat actors 🔎 CVE-2024-1709 · CVE-2024-1708
Primary Source ↗

Incident Details

On 19 February 2024, ConnectWise disclosed two critical vulnerabilities in ScreenConnect — an on-premises remote access tool used by managed service providers (MSPs) and IT teams globally. CVE-2024-1709 (CVSS 10.0) was an authentication bypass that allowed unauthenticated attackers to create admin accounts on ScreenConnect servers; CVE-2024-1708 was a path traversal that enabled code execution. ConnectWise released patches and published an advisory simultaneously. Within hours, multiple threat actors including ransomware groups began mass exploitation of on-premises ScreenConnect servers that had not yet been patched. CISA published Advisory AA24-057A on 27 February urging immediate patching. The exploitation was particularly severe because ScreenConnect is used by MSPs to manage thousands of client endpoints — a single compromised ScreenConnect server could provide attackers with access to all of that MSP’s clients simultaneously. Confirmed exploitation included: LockBit ransomware affiliates deploying ransomware through compromised ScreenConnect instances; the Bl00dy ransomware group targeting the education sector; and multiple nation-state adjacent actors. Huntress researchers estimated over 1,600 internet-exposed ScreenConnect servers were exploitable at time of disclosure. The vulnerabilities were used to deploy remote access trojans, conduct credential theft, and deliver ransomware across numerous victim organisations. The incident was comparable in MSP supply chain risk to the 2021 Kaseya VSA attack. Cloud-hosted ConnectWise ScreenConnect instances were automatically patched, but on-premises deployments required manual updates.

Technical Details

Initial Attack Vector
Authentication bypass vulnerability (CVE-2024-1709, CVSS 10.0) in ConnectWise ScreenConnect — a widely-used remote desktop and access tool used by managed service providers (MSPs) — allowed unauthenticated remote attackers to bypass authentication and create new administrator accounts, leading to complete system compromise; a second path traversal vulnerability (CVE-2024-1708) also existed; multiple ransomware groups and nation-state actors exploited the vulnerabilities within hours of disclosure
Vendor / Product
ConnectWise ScreenConnect (remote access / remote desktop tool for MSPs)
Software Package
ScreenConnect
Malware Family
LockBit ransomware, Bl00dy ransomware, various RATs and backdoors deployed by multiple threat actors
CVE / GHSA References
CVE-2024-1709 CVE-2024-1708
Supply Chain Attack
✅ Confirmed third-party / vendor compromise

Timeline

  1. 2024-02-19 Breach occurred
  2. 2024-02-19 Publicly disclosed
  3. 2024-02-19 Customers notified