ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
References
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/ - Exploit, Third Party Advisory | |
References | () https://www.connectwise.com - Product | |
References | () https://www.connectwise.com/blog/cybersecurity/the-importance-of-responsible-security-disclosures - | |
References | () https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity - |
Information
Published : 2023-02-13 20:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-25719
Mitre link : CVE-2023-25719
CVE.ORG link : CVE-2023-25719
JSON object : View
Products Affected
connectwise
- control
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')