CVE-2025-11492

9.6 CRITICAL

📋 TL;DR

CVE-2025-11492 allows man-in-the-middle attacks against ConnectWise Automate Agent when configured to use HTTP instead of HTTPS. An attacker on the network path could intercept, modify, or replay communications between agents and servers. All ConnectWise Automate deployments with vulnerable agent configurations are affected.

💻 Affected Systems

Products:
  • ConnectWise Automate Agent
Versions: All versions before 2025.9
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ✅ No
Notes: Only affects deployments where HTTP was explicitly configured instead of HTTPS for agent communications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of agent-server communications allowing credential theft, malware deployment, data exfiltration, and lateral movement across managed endpoints.

🟠

Likely Case

Interception of sensitive data (credentials, configuration details) and potential injection of malicious commands into agent communications.

🟢

If Mitigated

Limited to denial of service or reconnaissance if proper network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH - If agents communicate over internet without HTTPS, they're vulnerable to interception by ISPs or network intermediaries.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can intercept communications on local networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network position between agent and server, but no authentication or special privileges needed once positioned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ConnectWise Automate 2025.9

Vendor Advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-automate-2025.9-security-fix

Restart Required: Yes

Instructions:

1. Update ConnectWise Automate server to version 2025.9. 2. Deploy updated agents to all endpoints. 3. Verify all communications are using HTTPS. 4. Restart both server and agents.

🔧 Temporary Workarounds

Enforce HTTPS Configuration

all

Manually configure all agent communications to use HTTPS only

Edit agent configuration files to set 'UseSSL=true' and specify proper HTTPS endpoints

Network Segmentation

all

Isolate agent-server communications to trusted network segments

Implement VLAN segmentation, firewall rules to restrict agent traffic to specific paths

🧯 If You Can't Patch

  • Implement strict network monitoring for unencrypted agent communications
  • Deploy network-level TLS inspection/proxy to enforce HTTPS for all agent traffic

🔍 How to Verify

Check if Vulnerable:

Check agent configuration files for HTTP endpoints or UseSSL=false settings. Monitor network traffic for unencrypted agent communications on default ports.

Check Version:

On Windows: 'wmic product where name="ConnectWise Automate Agent" get version' or check agent UI. On Linux: Check agent installation directory version files.

Verify Fix Applied:

Confirm all agent configurations specify HTTPS endpoints and UseSSL=true. Verify network traffic shows TLS encryption for agent communications.

📡 Detection & Monitoring

Log Indicators:

  • Agent connection failures after HTTPS enforcement
  • Unusual agent reconnection patterns
  • Configuration change logs showing HTTP to HTTPS migration

Network Indicators:

  • Unencrypted traffic on agent communication ports (typically 80/8080 for HTTP)
  • SSL/TLS handshake failures for agent connections
  • Unexpected proxy or MITM devices in agent-server path

SIEM Query:

source="agent_logs" AND (event="connection_error" OR event="config_change") | search "HTTP" OR "UseSSL=false"

🔗 References

📤 Share & Export