Threat Brief: ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709)

Threat brief conceptual image for CVEs affecting ConnectWise ScreenWise. A long scroll with data and text floats before a grey background.

This post is also available in:
日本語 (Japanese)

Executive Summary

Feb. 13, 2024, ConnectWise was notified of two vulnerabilities impacting their remote desktop software application ScreenConnect. These vulnerabilities were first reported through their vulnerability disclosure channel in the ConnectWise Trust Center.

Feb. 19, 2024, ConnectWise publicly disclosed the vulnerabilities in a security bulletin.

As of Feb. 21, 2024, Unit 42 observed 18,188 unique IP addresses hosting ScreenConnect globally.

The newly disclosed vulnerabilities have now been assigned the following CVEs:

CVE NumberDescriptionCVSS Severity
CVE-2024-1708 ScreenConnect 23.9.7 and prior are affected by a path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.8.4 High
CVE-2024-1709ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.10.0 Critical

The authentication bypass vulnerability (CVE-2024-1709) is considered to be trivially exploitable, and proof-of-concept exploits are already available. Metasploit has released an unauthenticated remote code execution (RCE) exploit module for this vulnerability.

We assess with high confidence that this vulnerability will be actively targeted by various types of threat actors, including cybercriminals and nation-state actors, given the severity and scope of the vulnerability and the nature of the impacted product.

The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-1709 to the Known Exploited Vulnerabilities Catalog. According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, Federal Civilian Executive Branch agencies are required to address vulnerabilities identified in the catalog by the assigned due date. For this vulnerability the due date for remediation is Feb 29, 2024.

Table of Contents

Current Scope of the Attack
Mitigation Actions
Conclusion
Palo Alto Networks Product Protections for ConnectWise Vulnerabilities
Next-Generation Firewalls and Prisma Access With Advanced Threat Prevention
Cloud-Delivered Security Services for the Next-Generation Firewall
Cortex XDR and XSIAM
Indicators of Compromise
Additional Resources

Current Scope of the Attack

Unit 42 is providing Incident Response support to customers related to these vulnerabilities.

ConnectWise has confirmed that it has “received updates of compromised accounts that our incident response team have been able to investigate and confirm.”

As of Feb. 21, 2024, Unit 42 observed 18,188 unique IP addresses hosting ScreenConnect globally.

Earlier scans showed that nearly three-quarters of these hosts were in the U.S. The top ten countries accounted for over 95% of global exposure. Our observations are summarized in Figure 1 and Table 1.

Image 1 is a heatmap of ConnectWise ScreenConnect global exposure as of February 19th, 2024. The highest instances are in the United States.
Figure 1. Global exposure of ConnectWise ScreenConnect as of Feb. 19, 2024.
Top Ten Countries with ConnectWise ScreenConnect Exposure
Country NameUnique IP Addresses
United States6,445
United Kingdom466
Canada407
Australia401
Germany259
Ireland143
Netherlands71
India57
Singapore40
Sweden38

Table 1. Top ten countries with ConnectWise ScreenConnect exposure.

Mitigation Actions

The ConnectWise bulletin indicates that ScreenConnect servers hosted in screenconnect[.]com cloud or hostedrmm[.]com have been updated to remediate the issue and no end user action is required. For those with self-hosted or on-premise deployments, the guidance is to patch as soon as possible.

ConnectWise has removed license restrictions so that older versions can be upgraded even if no longer under maintenance.

Conclusion

Unit 42 will continue to monitor the situation and will update this post as more information becomes available.

Palo Alto Networks Product Protections for ConnectWise Vulnerabilities

Palo Alto Networks customers can leverage a variety of product protections and updates to identify and defend against this threat.

If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:

  • North America Toll-Free: 866.486.4842 (866.4.UNIT42)
  • EMEA: +31.20.299.3130
  • APAC: +65.6983.8730
  • Japan: +81.50.1790.0200

Next-Generation Firewalls and Prisma Access With Advanced Threat Prevention

Next-Generation Firewall with the Advanced Threat Prevention security subscription an help block the attacks with best practices via the following Threat Prevention signatures 95048.

Cloud-Delivered Security Services for the Next-Generation Firewall

Advanced URL Filtering categorizes exploit and scanning attempts as Scanning Activity. Advanced URL Filtering and DNS Security categorize as malicious known domains/IPs associated with this activity.

Cortex XDR and XSIAM

Cortex XDR and XSIAM help protect against post-exploitation activities using the multi-layer protection approach.

Cortex Xpanse

Cortex Xpanse has added Attack Surface Rules for both generic ConnectWise ScreenConnect as well as known insecure versions of identified ConnectWise ScreenConnect instances. These rules are also available to XSIAM customers who have purchased the ASM module.

Additionally, Cortex Xpanse has published a new Threat Response Center event for this pair of vulnerabilities.

Indicators of Compromise

ConnectWise has identified the following IoCs, which were recently used by threat actors:

  • 155.133.5[.]15
  • 155.133.5[.]14
  • 118.69.65[.]60

Sophos has identified the following IoCs. See their research on ConnectWise linked below.

Indicator TypeDataNote
SHA2560d185ea3b0a49c2fa65bfd2757c9d0705657f0639fd36f196ac394fcd38c361dMalware. Uses Sophos in properties.
SHA25611d2dde6c51e977ed6e3f3d3e256c78062ae41fe780aefecfba1627e66daf771Malware with Sophos name in properties. Source: hxxp://207.246.74.189:804/download/Diablo.log
SHA2561362e6d43b068005f5d7c755e997e6202775430ac15a794014aa9a7a03a974e7hxxp://185.232.92.32:8888/Logs.txt – Malicious Data, which will be loaded by (SentinelAgentCore.dll)
SHA25619fc383683b34ba31ed055dc2e546a64eecbe06d79b6cc346773478c84f25f92Installer for ScreenConnect distributed by threat actors. Source: hxxps://transfer.sh/get/6YoVhBPfKE/temp2.exe
SHA256254714b7028005596fd56bdbe30bfc77f02bbe274048d0982118d93966e79331hxxp://185.232.92.32:8888/all.ps1 – Malicious Script downloads payload (SentinelUI.exe, SentinelAgentCore.dll, Logs.txt) – Sideloading
SHA2562da975fee507060baa1042fb45e8467579abf3f348f1fd37b86bb742db63438aenc.exe ransomware executable
SHA2563818bb7adf60f8c2aeb5fe8c59b81fc7eb7f1471a80932610dc9a294ba7ba543Malware script that decodes to an executable. Source: hxxp://91.238.181.238/a
SHA256444338339260d884070de53554543785acc3c9772e92c5af1dff96e60e67c195Payload from f1c7045badec0b9771da4a0f067eac99587d235d1ede35190080cd051d923da6 %temp%xw.exe
SHA25655e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047AnyDesk installer distributed by threat actors. Source: hxxp://116.0.56.101:9191/images/Distribution.exe
SHA256858ddfe6530fb00adb467f26e2c8f119fef284e1e9b6c92f0634f403ee3e7913Source: hxxp://shapefiles.fews.net.s3.amazonaws.com:80/8gaLYHLcZ4DPV
SHA25686b5d7dd88b46a3e7c2fb58c01fbeb11dc7ad350370abfe648dbfad45edb8132Installer for SimpleHelp distributed by threat actors. Source: hxxps://transfer.sh/get/HcrhQuN0YC/temp3.exe
SHA2568c2d246bf93bf84f6d4376cd46d8fcc3cb9c96d9bef7d42c23ff222d8f66eeafcrypt64ult.exe ransomware executable inside of msappdata.msi
SHA2568e51de4774d27ad31a83d5df060ba008148665ab9caf6bc889a5e3fba4d7e600Source: hxxp://23.26.137.225:8084/msappdata.msi
SHA2569b3327f9ea7c02c6909a472a3c1abb562b19ae72d733a8e2e990e975b5f8a5d0Payload from 3818bb7adf60f8c2aeb5fe8c59b81fc7eb7f1471a80932610dc9a294ba7ba543 – Cobalt Strike
SHA256a39d9b1b41157510d16e41e7c877b35452f201d02a05afa328f1bcd53d8ee016hxxp://185.232.92.32:8888/SentinelAgentCore.dll – Malicious DLL Component (Loader)
SHA256a50d9954c0a50e5804065a8165b18571048160200249766bfa2f75d03c8cb6d0Ransomware binary built using the leaked Lockbit 3 builder tool
SHA256c94038781c56ab85d2f110db4f45b86ccf269e77a3ff4b9133b96745ff97d25fUpdaterScreenConnect.exe” malware
SHA256de42bd53cb0944da8bc33107796ecf296d00968725eed1763a8143cef90e2297hxxp://185.232.92.32:8888/sentinelui.exe – Clean File used for sideloading malicious DLL
SHA256f1c7045badec0b9771da4a0f067eac99587d235d1ede35190080cd051d923da6Script that decodes itself to become a malware executable
SHA256f3f5d3595559cad6019406d41f96fa88c69d693326cdf608c5fc4941fdf6a8ecr.bat file that downloads 858ddfe6530fb00adb467f26e2c8f119fef284e1e9b6c92f0634f403ee3e7913
SHA256b423d100e7aa2e576c8f21586f1d8924b34c3e9ed4cfdba40d121e21c3618445Decoded PowerShell script
URLhxxp://116.0.56.101:9191/images/Distribution.exeAnyDesk installer distributed by threat actors
URLhxxp://119.3.12.54:8000/identity_helper.exeURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://159.65.130.146:4444/aURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://159.65.130.146:4444/svchost.exeURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://185.232.92.32:8888/all.ps1URL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://185.232.92.32:8888/Logs.txtURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://185.232.92.32:8888/SentinelAgentCore.dllURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://185.232.92.32:8888/sentinelui.exeURL observed in ScreenConnect attacks. Payload not retrieved.
URLhxxp://207.246.74.189:804/download/Diablo.logMalicious stealer. File has properties that identify it as Sophos ML Model model.dll
URLhxxp://91.238.181.238/a3818bb7adf60f8c2aeb5fe8c59b81fc7eb7f1471a80932610dc9a294ba7ba543
URLhxxps://transfer.sh/get/6YoVhBPfKE/temp2.exeInstaller for ScreenConnect distributed by threat actors.
URLhxxps://transfer.sh/get/HcrhQuN0YC/temp3.exeInstaller for SimpleHelp remote access utility distributed by threat actors.

Additional Resources

Updated Feb. 23, 2024, at 6:13 a.m. PT to add additional information to the Executive Summary, Scope of Attack and Mitigations sections, including an update from CISA and other news. Added a Next-Generation Firewall Threat Prevention signature. 

Updated Feb. 29, 2024, at 12:40 p.m. PT to add new IoCs from Sophos, an Additional Resources section, and expanded protections for Next-Generation Firewall. 

Updated March 4, 2024, at 7:00 a.m. PT to add IPs to protections for Next-Generation Firewall. 

Source: Original Post


“An interesting youtube video that may be related to the article above”