First published: Thu Jul 16 2020(Updated: )
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ConnectWise Automate | <2019.12 | |
ConnectWise Automate | >=2020.0<=2020.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15027 is considered a medium severity vulnerability due to its potential for authentication bypass.
To mitigate CVE-2020-15027, upgrade ConnectWise Automate to version 2020.7 or apply the hotfix for version 2019.12.
CVE-2020-15027 affects ConnectWise Automate versions 2019.12 and versions between 2020.0 and 2020.6 inclusive.
CVE-2020-15027 allows an attacker to bypass authentication through insufficient validation, compromising system access.
Yes, CVE-2020-15027 was publicly disclosed as a vulnerability impacting ConnectWise Automate prior to its patch release.