Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

845+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability
CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability
SECURITYHIGHCVE-2024-1708

CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability

ConnectWise ScreenConnect contains a path traversal vulnerability (CVE-2024-1708) that allows attackers to execute remote code or directly access confidential data on critical systems. CISA added it to the KEV catalog confirming active exploitation.

Dylan H.

Security Team

April 29, 2026
6 min read

Affected Products

  • ConnectWise ScreenConnect (versions prior to 23.9.8)

Executive Summary

A high-severity path traversal vulnerability (CVE-2024-1708) in ConnectWise ScreenConnect has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, confirming active in-the-wild exploitation. The flaw allows an attacker to execute remote code or directly impact confidential data and critical systems by bypassing path restrictions within the ScreenConnect file handling functionality.

CVE-2024-1708 was disclosed alongside CVE-2024-1709 (a critical authentication bypass), and the two are frequently chained together in attacks. Federal Civilian Executive Branch (FCEB) agencies are required to remediate per CISA's binding operational directive. All organizations running ScreenConnect on-premises should treat this as an urgent, high-priority patch.


Vulnerability Overview

AttributeValue
CVE IDCVE-2024-1708
CVSS Score8.4 (High)
CWECWE-22 — Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)
TypePath Traversal / Remote Code Execution
Attack VectorNetwork
Privileges RequiredLow
User InteractionNone
VendorConnectWise
ProductScreenConnect
Fixed Version23.9.8 and later
CISA KEV AddedApril 28, 2026
Exploitation StatusActively exploited in the wild

Affected Versions

ProductAffected VersionsAction Required
ConnectWise ScreenConnectAll versions prior to 23.9.8Update immediately

Technical Analysis

Root Cause

The vulnerability resides in ScreenConnect's file handling and upload functionality. User-supplied path components are not properly normalized or restricted to an allowed directory tree. By supplying path traversal sequences (e.g., ../../) in file paths, an attacker can:

  • Write arbitrary files outside the intended directory
  • Overwrite application configuration or code
  • Achieve remote code execution in the context of the ScreenConnect service account

Attack Chain with CVE-2024-1709

CVE-2024-1708 is most dangerous when chained with CVE-2024-1709, an authentication bypass that allows an unauthenticated attacker to create a new administrative user account:

1. Attacker identifies a ScreenConnect instance reachable from the internet
2. CVE-2024-1709: Attacker bypasses authentication — creates rogue admin account
3. Authenticated as new admin, attacker exploits CVE-2024-1708
4. Crafts a path traversal payload in file upload or management endpoint
5. Writes a web shell or malicious file outside the ScreenConnect web root
6. Executes uploaded code — achieves full RCE on the ScreenConnect host
7. Post-exploitation: credential harvesting, lateral movement, ransomware staging

Why This Is Dangerous

FactorImpact
Paired with auth bypass (CVE-2024-1709)Effectively unauthenticated exploitation when chained
ScreenConnect is a remote access toolCompromised server grants access to all managed endpoints
High install baseThousands of on-premises ScreenConnect deployments internet-exposed
CISA KEV confirmedActive exploitation is ongoing
Managed Service Providers (MSPs) targetedCompromise of a single ScreenConnect server can pivot to thousands of client environments

Impact Assessment

Impact AreaDescription
Remote Code ExecutionArbitrary code execution on the ScreenConnect server host
Full Endpoint AccessScreenConnect agents allow control of all managed remote endpoints
Credential TheftAccess to stored ScreenConnect session credentials and client data
Lateral MovementCompromised ScreenConnect instance used to pivot into all managed networks
Ransomware StagingMultiple ransomware groups have leveraged this chain for initial access
Data ExfiltrationAccess to files and configurations on the ScreenConnect server

Immediate Remediation

Step 1: Upgrade ScreenConnect Immediately

Apply the security patch released by ConnectWise. The fixed version is 23.9.8:

# Check your current ScreenConnect version
# Navigate to Admin > About in the ScreenConnect web interface
 
# For cloud-hosted ScreenConnect (ScreenConnect.com):
# ConnectWise has already patched cloud instances — no action needed
 
# For on-premises installations:
# Download the latest installer from ConnectWise partner portal
# Stop the ScreenConnect service before upgrading
net stop ScreenConnect
# Run the installer to upgrade
# Restart and verify the new version

Step 2: Verify No Compromise Occurred

# Check for unexpected files in the ScreenConnect web root
# Default path (Windows): C:\Program Files (x86)\ScreenConnect\
dir "C:\Program Files (x86)\ScreenConnect\App_Extensions\" /s /b *.aspx
dir "C:\Program Files (x86)\ScreenConnect\App_Extensions\" /s /b *.ashx
dir "C:\Program Files (x86)\ScreenConnect\App_Extensions\" /s /b *.php
 
# Review Windows Event Logs for new admin account creation
Get-WinEvent -LogName Security | Where-Object {$_.Id -eq 4720} | Select-Object TimeCreated, Message | Format-List
 
# Check for unauthorized ScreenConnect admin accounts
# Navigate to Admin > Users in the ScreenConnect web interface

Step 3: Restrict Internet Exposure

If immediate patching is not possible:

# Block external access to ScreenConnect relay port (default 443/8040)
# via Windows Firewall or perimeter firewall until patched
New-NetFirewallRule -DisplayName "Block SC External" -Direction Inbound `
  -LocalPort 443,8040 -Protocol TCP -Action Block `
  -RemoteAddress "0.0.0.0/0" -Enabled True

Step 4: Post-Patch Hardening

# After upgrading, review and tighten ScreenConnect access controls:
# 1. Enable two-factor authentication for all ScreenConnect admin accounts
# 2. Review the admin user list and remove any unrecognized accounts
# 3. Restrict the admin interface to known IP ranges if possible
# 4. Enable audit logging for all ScreenConnect admin actions
# 5. Rotate ScreenConnect service account credentials

Detection Indicators

IndicatorDescription
Unexpected .aspx / .ashx files in App_ExtensionsWeb shell deployed post-exploitation
New admin account creation events (Windows Event ID 4720)Potential CVE-2024-1709 exploitation
ScreenConnect admin logins from unknown IPsUnauthorized access via rogue account
Outbound connections from the ScreenConnect server processReverse shell or C2 beaconing
Large data transfers from ScreenConnect hostCredential or data exfiltration
Remote PowerShell execution from ScreenConnect servicePost-exploitation command execution

Post-Remediation Checklist

  1. Upgrade ConnectWise ScreenConnect to version 23.9.8 or later
  2. Audit the admin user list — remove any accounts not recognized by your team
  3. Reset all admin passwords after upgrading
  4. Scan the web root for unexpected .aspx, .ashx, or other script files
  5. Review Windows Security Event Log for Event ID 4720 (account creation) near the disclosure date
  6. Check all managed endpoints for signs of lateral movement from the ScreenConnect server
  7. Enable 2FA on all ScreenConnect administrator accounts
  8. Restrict the admin panel to known IP ranges or VPN access only
  9. Notify clients if you are an MSP — all managed environments should be assessed for post-compromise indicators
  10. Monitor for re-exploitation until upgrade is confirmed across all on-premises deployments

References

  • NVD — CVE-2024-1708
  • CISA Known Exploited Vulnerabilities Catalog
  • ConnectWise Security Advisory
#CVE-2024-1708#ConnectWise#ScreenConnect#Path Traversal#RCE#CISA KEV#Vulnerability

Related Articles

CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability

Kentico Xperience contains a path traversal vulnerability allowing an authenticated user's Staging Sync Server to upload arbitrary data to relative path...

5 min read

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2025-32432: Craft CMS Code Injection Vulnerability

A critical code injection vulnerability in Craft CMS allows unauthenticated remote attackers to execute arbitrary code on affected servers. Added to...

6 min read
Back to all Security Alerts