An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a user enumeration vulnerability, allowing an unauthenticated attacker to determine with certainty if an account exists for a given username.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 - Exploit, Third Party Advisory | |
References | () https://know.bishopfox.com/advisories - Third Party Advisory | |
References | () https://know.bishopfox.com/advisories/connectwise-control - Exploit, Third Party Advisory | |
References | () https://www.crn.com/news/managed-services/connectwise-control-msp-security-vulnerabilities-are-severe-bishop-fox - Third Party Advisory | |
References | () https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox - Third Party Advisory |
Information
Published : 2020-01-23 18:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16516
Mitre link : CVE-2019-16516
CVE.ORG link : CVE-2019-16516
JSON object : View
Products Affected
connectwise
- control
CWE
CWE-203
Observable Discrepancy