Vulnerabilities (CVE)

Filtered by vendor Connectwise Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15838 1 Connectwise 1 Automate 2021-07-21 6.5 MEDIUM 8.8 HIGH
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
CVE-2021-32582 1 Connectwise 1 Connectwise Automate 2021-06-22 5.0 MEDIUM 7.5 HIGH
An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses.
CVE-2020-15008 1 Connectwise 1 Connectwise Automate 2020-07-16 6.0 MEDIUM 7.5 HIGH
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
CVE-2020-14159 1 Connectwise 1 Automate Api 2020-06-24 6.5 MEDIUM 8.8 HIGH
By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178.
CVE-2019-16514 1 Connectwise 1 Control 2020-01-28 6.5 MEDIUM 7.2 HIGH
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server.
CVE-2019-16513 1 Connectwise 1 Control 2020-01-24 6.8 MEDIUM 8.8 HIGH
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. CSRF can be used to send API requests.
CVE-2017-11726 1 Connectwise 1 Manage 2017-08-04 6.8 MEDIUM 8.8 HIGH
services/system_io/actionprocessor/System.rails in ConnectWise Manage 2017.5 is vulnerable to Cross-Site Request Forgery (CSRF), as demonstrated by changing an e-mail address setting.