Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Automate
(Connectwise)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 7 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-02-01 | CVE-2023-23126 | Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack. | Automate | 6.1 | ||
2023-02-01 | CVE-2023-23130 | Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. | Automate | 5.9 | ||
2024-02-01 | CVE-2023-47256 | ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings | Automate, Screenconnect | 5.5 | ||
2024-02-01 | CVE-2023-47257 | ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages. | Automate, Screenconnect | 8.1 | ||
2020-10-09 | CVE-2020-15838 | The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions. | Automate | 8.8 | ||
2021-06-21 | CVE-2021-35066 | An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132. | Automate | 9.8 | ||
2020-07-16 | CVE-2020-15027 | ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12. | Automate | N/A |