Critical ConnectWise Flaws Enable Malicious Update Injections
The vulnerabilities, tracked as CVE-2025-11492 and CVE-2025-11493, carry high CVSS 3.1 scores of 9.6 and 8.8 respectively, signaling the potential for devastating impact if exploited.
In on-premises deployments of ConnectWise Automate versions prior to 2025.9, agents could be configured to use unencrypted HTTP channels or rely on weaker encryption settings.
This configuration opens the door for network-based adversaries to eavesdrop on sensitive data, modify in-transit traffic, or even inject unauthorized updates into the communication stream.
The more severe of these flaws, CVE-2025-11492 (CWE-319), allows attackers to view or alter agent communications without user interaction, leading to complete compromise of confidentiality, integrity, and availability.
The second vulnerability, CVE-2025-11493 (CWE-494), arises from the lack of integrity validation when agents download code updates.
Without strong integrity checks in place, threat actors could exploit man-in-the-middle positions to deliver and execute malicious payloads under the guise of legitimate software updates.
This loophole carries significant risk: by substituting harmful code, attackers could establish persistent footholds within corporate networks and evade traditional security controls.
To remediate these risks, ConnectWise Automate 2025.9 now enforces HTTPS for all agent communications, ensuring that data in transit is protected by robust encryption.
According to the report, Partners operating on-prem servers must update to version 2025.9 without delay and verify that Transport Layer Security (TLS) 1.2 is strictly enforced. Cloud customers have already received the patched version automatically.
Despite being classified as “Important” with a “Moderate” priority rating, these vulnerabilities pose a high practical risk—exploitable without authorization and likely to attract real-world attacks.
Organizations are advised to schedule the update as an emergency change or implement it within days to avoid potential compromise.
Detailed instructions for applying the 2025.9 release can be found in the ConnectWise Automate Release Notes 2025.9 on the official documentation portal.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Critical ConnectWise Flaws Enable Malicious Update Injections appeared first on Cyber Security News.
Warning: This review contains full spoilers for The Pitt Season 2, Episode 10!The best episodes…
Apple recently released its newest budget smartphone - the Apple iPhone 17e - on March…
Blight: Survival has reemerged with a new gameplay trailer — and its developers are promising…
Bluetti is well known for its high quality yet affordable power stations and solar generators.…
There’s something endlessly endearing about a good-natured dummy. Just a happy, optimistic doofus that can…
(KTAB/KRBC) - The Sweetwater Rattlesnake Roundup Parade for 2026 is taking place at 4:30 p.m.,…
This website uses cookies.