First published: Sun Sep 11 2022(Updated: )
ConnectWise ScreenConnect versions 22.6 and below contained a flaw allowing potential brute force attacks on custom access tokens due to inadequate rate-limiting controls in the default configuration. Attackers could exploit this vulnerability to gain unauthorized access by repeatedly attempting access code combinations. ConnectWise has addressed this issue in later versions by implementing rate-limiting controls as a preventive measure against brute force attacks.
Credit: cna@cyber.gov.il cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
ConnectWise Manage | <22.7 | |
ScreenConnect | <22.7 |
Update to version 22.7.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36781 has a medium severity rating due to its potential for exploitation through brute force attacks.
To fix CVE-2022-36781, you should upgrade to ConnectWise ScreenConnect version 22.7 or later to ensure adequate rate-limiting controls are in place.
CVE-2022-36781 affects ConnectWise ScreenConnect versions 22.6 and below.
CVE-2022-36781 allows potential brute force attacks on custom access tokens due to inadequate security provisions.
Organizations using ConnectWise ScreenConnect versions 22.6 and below are impacted by CVE-2022-36781.