ScreenConnect Vulnerability Exposes Machine Keys, Enables Session Hijacking

Related

ConsentFix v3 Automates OAuth Abuse to Bypass MFA and Hijack Azure Accounts

What happened A third iteration of the ConsentFix attack technique...

cPanel and WHM Emergency Update Fixes Critical Authentication Bypass Bug

What happened cPanel and WebHost Manager have received an emergency...

Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw

What happened Active exploitation of a critical SQL injection vulnerability...

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

What happened Microsoft has revised its advisory for CVE-2026-32202, a...

CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attacks

What happened CISA added two actively exploited vulnerabilities in SimpleHelp...

Share

What happened

ConnectWise disclosed a critical vulnerability in its ScreenConnect remote access software that allows attackers to extract unique machine keys and hijack active sessions. The flaw stems from how earlier versions stored cryptographic machine keys in server configuration files, which under certain conditions could be accessed by unauthorized actors. If extracted, these keys can be used to impersonate legitimate sessions and bypass authentication controls. The vulnerability, tracked as CVE-2026-3564, carries a CVSS score of 9.0, indicating critical severity. Researchers noted that once the keys are compromised, attackers can gain persistent access and potentially take full control of affected systems without requiring user interaction. 

Who is affected

Organizations using on-premises versions of ConnectWise ScreenConnect, particularly older or unpatched deployments, are affected, as attackers can exploit exposed machine keys to hijack sessions and access managed systems. 

Why CISOs should care

The vulnerability impacts a remote access platform with administrative-level control over endpoints, meaning successful exploitation can lead to widespread compromise across managed environments. 

3 practical actions

  1. Upgrade ScreenConnect immediately. Apply updates that secure machine key handling and prevent unauthorized extraction. 
  2. Audit server configuration exposure. Ensure sensitive cryptographic material is not accessible or improperly stored. 
  3. Monitor for session anomalies. Detect unauthorized session activity that may indicate key misuse or impersonation. 

For more coverage of newly disclosed security flaws and active exploitation, explore our reporting under the Vulnerabilities tag.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts