An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server.
References
Configurations
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 - Exploit, Third Party Advisory | |
References | () https://know.bishopfox.com/advisories - Third Party Advisory | |
References | () https://know.bishopfox.com/advisories/connectwise-control - Exploit, Third Party Advisory | |
References | () https://www.crn.com/news/managed-services/connectwise-control-msp-security-vulnerabilities-are-severe-bishop-fox - Third Party Advisory | |
References | () https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox - Third Party Advisory |
Information
Published : 2020-01-23 18:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16514
Mitre link : CVE-2019-16514
CVE.ORG link : CVE-2019-16514
JSON object : View
Products Affected
connectwise
- control
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type