CISA Warning: Attacks on ConnectWise ScreenConnect and Windows Shell

The US cybersecurity agency CISA warns of observed attacks on the Windows Shell and ConnectWise ScreenConnect.

listen Print view
Cyber,Hacker,Attack,Background,,Skull,Vector

(Image: Titima Ongkantong/Shutterstock.com)

2 min. read

Attackers are targeting vulnerabilities in ConnectWise ScreenConnect and the Windows Shell. The US cybersecurity agency CISA is now warning of attacks on these.

In its statement, CISA announced that it has added two exploited vulnerabilities to its Known Exploited Vulnerabilities catalog, but the agency did not provide further details. The scope, nature, and consequences of the attacks are therefore unclear. However, CVE vulnerability entries sometimes allow for other conclusions to be drawn. For example, attacks on the Windows Shell became known yesterday (Tuesday) (CVE-2026-32202, CVSS 4.3, risk “medium”). Akamai, for instance, has published more in-depth background information, classifying the leak as a zero-click vulnerability and discussing how attackers can exploit it to steal Net-NTLM-v2 hashes and misuse them in NTLM relay attacks, which they are now doing in practice.

The security vulnerability in ConnectWise ScreenConnect, which malicious actors are exploiting, has been known since February 2024 (CVE-2024-1708, CVSS 8.4, risk “high”). Since then, there have also been updates to the Remote Monitoring and Management (RMM) software. Here, IT security researchers from Huntress provide helpful hints – which date back to mid-February but are apparently still relevant.

The CVE-2024-1708 vulnerability is a so-called path traversal vulnerability, which allows attackers to deploy malicious code on vulnerable systems. According to Huntress, malicious actors are using this with the CVE-2024-1709 vulnerability (CVSS 10.0, risk “critical”), which enables authentication bypass. The attack using combined vulnerabilities has been named “SlashAndGrab.” ConnectWise ScreenConnect versions 23.9.7 and earlier are affected; the fix was released with ScreenConnect 23.9.8 and later.

Videos by heise

IT administrators should close the security vulnerabilities by applying the available patches. Those using ConnectWise ScreenConnect can also find some indicators of compromise (IOCs) in the Huntress analysis, which can be used to scan systems.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.