CVE-2026-3564

ConnectWise · ScreenConnect

A critical flaw in ScreenConnect allows attackers with access to server-level cryptographic material to obtain unauthorized access and elevated privileges.

Executive summary

ConnectWise ScreenConnect contains a high-severity vulnerability that could allow an attacker to gain unauthorized administrative access by leveraging server-level cryptographic materials.

Vulnerability

The vulnerability involves a condition where an actor who has obtained server-level cryptographic material used for authentication can bypass security checks. This allows for unauthorized access and the potential for privilege escalation within the ScreenConnect environment.

Business impact

Unauthorized access to a remote monitoring and management (RMM) tool like ScreenConnect can lead to a total compromise of all managed endpoints. The CVSS score of 9.0 highlights the severe risk of data exfiltration, ransomware deployment, and long-term persistence within an organization's infrastructure.

Remediation

Immediate Action: Update ScreenConnect to the latest version provided by the vendor and rotate all server-level cryptographic keys and authentication tokens.

Proactive Monitoring: Review ScreenConnect audit logs for unusual login activity, especially from unknown IP addresses or at irregular times, and monitor for unauthorized privilege changes.

Compensating Controls: Implement multi-factor authentication (MFA) for all ScreenConnect accounts and restrict access to the management console using IP allowlisting and VPNs.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Administrators must treat this vulnerability with the highest urgency due to the potential for widespread endpoint compromise. Apply the vendor's updates immediately and ensure that cryptographic secrets are rotated to invalidate any potentially compromised material.