CVE-2023-25718

9.8 CRITICAL

📋 TL;DR

This vulnerability in ConnectWise Control (formerly ScreenConnect) allows attackers to modify signed executable files without invalidating their digital signatures. Attackers can trick users into downloading and executing malicious files that appear legitimate. All ConnectWise Control installations through version 22.9.10032 are affected.

💻 Affected Systems

Products:
  • ConnectWise Control (formerly ScreenConnect)
Versions: Through 22.9.10032
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All ConnectWise Control deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could distribute malware that appears to be legitimate ConnectWise Control executables, leading to complete system compromise, data theft, and lateral movement across networks.

🟠

Likely Case

Users download and execute attacker-controlled files thinking they're legitimate ConnectWise Control updates or components, resulting in malware installation and potential credential theft.

🟢

If Mitigated

With proper configuration options enabled, the risk is reduced but not eliminated; users might still be prompted but would have additional warnings.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept demonstrates DNS spoofing to deliver malicious executables; exploitation requires user interaction but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.9.10033 and later

Vendor Advisory: https://www.connectwise.com

Restart Required: Yes

Instructions:

1. Download latest ConnectWise Control version from vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart ConnectWise Control services.

🔧 Temporary Workarounds

Enable additional security prompts

all

Configure ConnectWise Control to show additional warnings before executable downloads

Network segmentation

all

Restrict ConnectWise Control server network access to prevent DNS spoofing attacks

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent unauthorized executable execution
  • Deploy network monitoring to detect DNS spoofing and unusual executable downloads

🔍 How to Verify

Check if Vulnerable:

Check ConnectWise Control version in web interface or installation directory

Check Version:

On Windows: Check Help > About in ConnectWise Control interface

Verify Fix Applied:

Verify version is 22.9.10033 or higher and check that digital signature validation is functioning

📡 Detection & Monitoring

Log Indicators:

  • Unexpected executable downloads via ConnectWise Control
  • Multiple failed signature validation attempts

Network Indicators:

  • DNS spoofing attempts targeting ConnectWise domains
  • Unusual outbound connections from ConnectWise servers

SIEM Query:

source="connectwise" AND (event="executable_download" OR event="signature_validation_failure")

🔗 References

📤 Share & Export