Categories: Cyber Security News

Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data

ConnectWise has issued a security update for ScreenConnect to address a critical vulnerability that could enable attackers to expose sensitive configuration data and install untrusted extensions.

The flaw, identified as CVE-2025-14265, affects only the ScreenConnect server component, leaving host and guest clients unaffected.

The vulnerability stems from improper code integrity validation during extension installations, classified under CWE-494 (Download of Code Without Integrity Check).

With a CVSS 3.1 base score of 9.1, CVE-2025-14265 falls into the “Important” severity category. Indicating potential compromise of confidential data or resources under specific conditions.

CVE ID CWE ID Description Base Score
CVE-2025-14265 CWE-494 Download of Code Without Integrity Check 9.1

Exploitation requires authorized or administrative-level access, and ConnectWise has confirmed that there is no evidence of active exploitation in the wild.

However, the vulnerability’s critical rating and network-based attack vector (AV: N) underscore the importance of immediate remediation.

The ScreenConnect 25.8 patch strengthens server-side validation, enforces integrity checks for extension installations, and enhances overall platform security.

All versions of ScreenConnect before 25.8 are affected and require an immediate update. For cloud-hosted installations on screenconnect.com or hostedrmm.com, updates have been automatically applied.

On-premises partners must upgrade to ScreenConnect version 25.8 and update guest clients accordingly.

Partners with Automate integration should first confirm their Automate ScreenConnect Extension is updated to version 4.4.0.16 before upgrading to ScreenConnect 25.8.

ConnectWise assigns this vulnerability a Priority 2 – Moderate rating and recommends updating it within 30 days through normal change management processes.

Organizations should prioritize patching to prevent potential unauthorized access to sensitive configuration data and maintain a secure remote access infrastructure.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Stan Lambert leads surprise celebration honoring Fabrizio’s retirement

ABILENE, Texas (KTAB/KRBC) – Dr. Paul Fabrizio was honored Monday at McMurry University by State…

23 minutes ago

Abilene firefighters plan block walking, election outreach in push for bargaining rights

ABILENE, Texas (KTAB/KRBC) - Over the past couple of months, the Abilene Professional Fire Fighters…

23 minutes ago

Abilene ISD selects new principal for Stafford Elementary

ABILENE, Texas (KTAB/KRBC) - Christina Dooley has been named the next principal of Stafford Elementary…

23 minutes ago

Bethesda Responds to Starfield PS5 Crashing Issues

Bethesda says it is "aware" of the crashing issues some people are reporting when playing…

53 minutes ago

Avengers: Doomsday and Secret Wars Update

Avengers: Doomsday is reportedly in post-production, with Avengers: Secret Wars now in pre-production. Variety outlined…

53 minutes ago

Bethesda Responds to Starfield PS5 Crashing Issues

Bethesda says it is "aware" of the crashing issues some people are reporting when playing…

53 minutes ago

This website uses cookies.