First published: Mon Feb 13 2023(Updated: )
ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ConnectWise Control | <22.9.10032 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25719 is a vulnerability in ConnectWise Control (formerly known as ScreenConnect) that allows for the injection of malicious code into a downloaded executable.
The severity of CVE-2023-25719 is high, with a severity value of 8.8.
CVE-2023-25719 affects ConnectWise Control versions before 22.9.10032 by failing to validate user-supplied parameters, which can result in the injection of malicious code into downloaded executables.
To fix CVE-2023-25719, it is recommended to upgrade ConnectWise Control to version 22.9.10032 or higher, which includes the necessary validation of user-supplied parameters.
CWE-74 is a code injection vulnerability that occurs when untrusted data is used to construct dynamic code that is executed by the application.