Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data

Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
ConnectWise has issued a security update for ScreenConnect™ to address a critical vulnerability that could enable attackers to expose sensitive configuration data and install untrusted extensions.

The flaw, identified as CVE-2025-14265, affects only the ScreenConnect server component, leaving host and guest clients unaffected.

The vulnerability stems from improper code integrity validation during extension installations, classified under CWE-494 (Download of Code Without Integrity Check).

With a CVSS 3.1 base score of 9.1, CVE-2025-14265 falls into the “Important” severity category. Indicating potential compromise of confidential data or resources under specific conditions.

CVE IDCWE IDDescriptionBase Score
CVE-2025-14265CWE-494Download of Code Without Integrity Check9.1

Exploitation requires authorized or administrative-level access, and ConnectWise has confirmed that there is no evidence of active exploitation in the wild.

However, the vulnerability’s critical rating and network-based attack vector (AV: N) underscore the importance of immediate remediation.

The ScreenConnect 25.8 patch strengthens server-side validation, enforces integrity checks for extension installations, and enhances overall platform security.

All versions of ScreenConnect before 25.8 are affected and require an immediate update. For cloud-hosted installations on screenconnect.com or hostedrmm.com, updates have been automatically applied.

On-premises partners must upgrade to ScreenConnect version 25.8 and update guest clients accordingly.

Partners with Automate integration should first confirm their Automate ScreenConnect Extension is updated to version 4.4.0.16 before upgrading to ScreenConnect 25.8.

ConnectWise assigns this vulnerability a Priority 2 – Moderate rating and recommends updating it within 30 days through normal change management processes.

Organizations should prioritize patching to prevent potential unauthorized access to sensitive configuration data and maintain a secure remote access infrastructure.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading