The vulnerability, tracked as CVE-2025-14265, carries a CVSS score of 9.1, indicating severe potential impact despite requiring administrative-level access to exploit.
The vulnerability stems from insufficient code-integrity validation during extension installation, classified as CWE-494: Download of Code Without Integrity Check.
This flaw allows attackers with authorized or administrative privileges to bypass security controls and compromise the ScreenConnect server component.
ConnectWise has assigned this vulnerability a Priority 2 (Moderate) rating and recommends patching within 30 days as part of routine change management.
Notably, ConnectWise reports no evidence of active exploitation in the wild. The vulnerability affects only the ScreenConnect server component; host and guest clients remain unaffected.
This distinction is critical for organizations planning their patching strategy and risk mitigation efforts.
ConnectWise has adopted a two-pronged remediation approach tailored to deployment models.
Organizations operating ScreenConnect through ConnectWise’s cloud infrastructure, including standalone deployments, Automate/RMM integrated instances, and hostedrmm.com for Automate partners, require no action.
These systems have been automatically updated to remediation status.
For on-premises deployments, remediation requires immediate attention. Partners must upgrade to ScreenConnect version 25.8 and ensure guest clients are synchronized to the same version.
Organizations can download the update through the official ScreenConnect download portal, though valid on-premises licenses are required.
Those with expired maintenance agreements must renew or upgrade their licensing before installing the latest release.
Automating partners using the on-premises ScreenConnect integration requires additional prerequisites.
The Automate ScreenConnect Extension must be updated to version 4.4.0.16 before upgrading the ScreenConnect server to 25.8.
Partners can facilitate this update either by allowing automatic updates or manually applying patches through the Extensions tab, ensuring compatibility and system stability.
The ScreenConnect 25.8 patch implements strengthened server-side validation mechanisms and enforces comprehensive integrity checks for all extension installations.
These improvements collectively enhance platform security posture and maintain overall system stability during the upgrade process.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates
The post Critical ScreenConnect Vulnerability Allows Attackers to Expose Sensitive Configuration Data appeared first on Cyber Security News.
Menlo Park, USA, March 10th, 2026, CyberNewswire AccuKnox, a leading Zero Trust Cloud-Native Application Protection…
OpenClaw, a self-hosted AI agent, rose to become GitHub’s most-starred repository weeks after its launch,…
Artificial intelligence leader Anthropic has filed an unprecedented lawsuit against the United States government after…
Two “Important” severity vulnerabilities have been disclosed in Apache ZooKeeper, a widely used service for…
A powerful iPhone exploit kit named “Coruna,” initially created for Western intelligence by U.S. contractor…
Estefany Maria Rodríguez Florez, a reporter for the Spanish-language news outlet Nashville Noticias, was arrested…
This website uses cookies.