ConnectWise Patches ScreenConnect Vulnerability Allowing Session Hijacking

Related

ConsentFix v3 Automates OAuth Abuse to Bypass MFA and Hijack Azure Accounts

What happened A third iteration of the ConsentFix attack technique...

cPanel and WHM Emergency Update Fixes Critical Authentication Bypass Bug

What happened cPanel and WebHost Manager have received an emergency...

Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw

What happened Active exploitation of a critical SQL injection vulnerability...

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

What happened Microsoft has revised its advisory for CVE-2026-32202, a...

CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attacks

What happened CISA added two actively exploited vulnerabilities in SimpleHelp...

Share

What happened

ConnectWise released security updates to fix a vulnerability in its ScreenConnect remote access software that could allow attackers to hijack active sessions and gain unauthorized control of managed systems. The flaw affects how the application handles authentication and session management, potentially enabling threat actors to take over existing connections without valid credentials. Similar ScreenConnect vulnerabilities in past disclosures have included authentication bypass and code execution flaws that allow attackers to gain administrative access and pivot into connected environments.  The company urged users to apply patches immediately to prevent exploitation, especially for internet-exposed instances.

Who is affected

Organizations using ConnectWise ScreenConnect, particularly self-hosted or unpatched deployments exposed to the internet, are affected, as attackers could hijack sessions and access connected endpoints.

Why CISOs should care

Remote monitoring and management tools like ScreenConnect provide deep administrative access, making vulnerabilities in these platforms high-impact entry points that can enable lateral movement and compromise of multiple systems.

3 practical actions

  1. Apply ScreenConnect updates immediately. Patch affected versions to prevent session hijacking and unauthorized access.
  2. Restrict exposure of remote access tools. Limit internet-facing access to ScreenConnect servers and enforce network controls.
  3. Audit active sessions and access logs. Review for unauthorized connections or suspicious activity indicating session takeover.

For more coverage of newly disclosed security flaws, explore our reporting under the Vulnerability tag.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts