Categories: Cyber Security News

Critical ScreenConnect Vulnerability Allows Attackers to Expose Sensitive Configuration Data

ConnectWise has released ScreenConnect version 25.8, a critical security update addressing a dangerous vulnerability that could enable unauthorized access to sensitive configuration data and installation of untrusted extensions on affected systems.

The vulnerability, tracked as CVE-2025-14265, carries a CVSS score of 9.1, indicating severe potential impact despite requiring administrative-level access to exploit.

Vulnerability Details and Risk Assessment

Sponsored

The vulnerability stems from insufficient code-integrity validation during extension installation, classified as CWE-494: Download of Code Without Integrity Check.

This flaw allows attackers with authorized or administrative privileges to bypass security controls and compromise the ScreenConnect server component.

ConnectWise has assigned this vulnerability a Priority 2 (Moderate) rating and recommends patching within 30 days as part of routine change management.

Notably, ConnectWise reports no evidence of active exploitation in the wild. The vulnerability affects only the ScreenConnect server component; host and guest clients remain unaffected.

This distinction is critical for organizations planning their patching strategy and risk mitigation efforts.

ConnectWise has adopted a two-pronged remediation approach tailored to deployment models.

Organizations operating ScreenConnect through ConnectWise’s cloud infrastructure, including standalone deployments, Automate/RMM integrated instances, and hostedrmm.com for Automate partners, require no action.

These systems have been automatically updated to remediation status.

For on-premises deployments, remediation requires immediate attention. Partners must upgrade to ScreenConnect version 25.8 and ensure guest clients are synchronized to the same version.

Sponsored

Organizations can download the update through the official ScreenConnect download portal, though valid on-premises licenses are required.

Those with expired maintenance agreements must renew or upgrade their licensing before installing the latest release.

Automating partners using the on-premises ScreenConnect integration requires additional prerequisites.

The Automate ScreenConnect Extension must be updated to version 4.4.0.16 before upgrading the ScreenConnect server to 25.8.

Partners can facilitate this update either by allowing automatic updates or manually applying patches through the Extensions tab, ensuring compatibility and system stability.

The ScreenConnect 25.8 patch implements strengthened server-side validation mechanisms and enforces comprehensive integrity checks for all extension installations.

These improvements collectively enhance platform security posture and maintain overall system stability during the upgrade process.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates

The post Critical ScreenConnect Vulnerability Allows Attackers to Expose Sensitive Configuration Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools

Menlo Park, USA, March 10th, 2026, CyberNewswire AccuKnox, a leading Zero Trust Cloud-Native Application Protection…

4 minutes ago

OpenClaw Advisory Surge Exposes Gap Between GitHub and CVE Vulnerability Tracking

OpenClaw, a self-hosted AI agent, rose to become GitHub’s most-starred repository weeks after its launch,…

4 minutes ago

Anthropic Sued the U.S. Government for Labelling Claude as ‘Supply Chain Risk’

Artificial intelligence leader Anthropic has filed an unprecedented lawsuit against the United States government after…

4 minutes ago

Apache ZooKeeper Vulnerability Allow Attackers to Access Sensitive Data

Two “Important” severity vulnerabilities have been disclosed in Apache ZooKeeper, a widely used service for…

4 minutes ago

iPhone Exploit Toolkit Used by Russian Spies Likely Originated from U.S. Contractor

A powerful iPhone exploit kit named “Coruna,” initially created for Western intelligence by U.S. contractor…

5 minutes ago

Nashville reporter arrested by ICE asserts First, Fifth Amendment violations in new legal filings

Estefany Maria Rodríguez Florez, a reporter for the Spanish-language news outlet Nashville Noticias, was arrested…

19 minutes ago

This website uses cookies.