- "도난 시도만 3억 달러 이상"··· AI 기반 '벤더 이메일 손상 공격'에 주목할 이유
- Cyber as a Pressure Valve: Why Economic Conflict Is Fueling a New Era of Cyber Escalation
- “2025년 스테이블코인 투자 2024년 대비 10배 예상”···CB인사이츠, ‘스테이블코인 시장 지도’ 공개
- The best portable power stations for camping in 2025: Expert tested and reviewed
- "제조 업계, 스마트 기술 전환 중··· 95%가 AI 투자 예정" 로크웰 오토메이션
Ransomware Warning as CVSS 10.0 ScreenConnect Bug is Exploited

IT admins have been urged to patch any on-premises ScreenConnect servers immediately, after reports that a recently published maximum severity vulnerability is being exploited in the wild.
CVE-2024-1709 is an authentication bypass bug which has been given a CVSS score of 10.0. It can be exploited without user interaction to execute arbitrary code and access sensitive data in low-complexity attacks.
ConnectWise, the maker of the remote desktop software application, also revealed a path traversal vulnerability with a CVSS score of 8.4 – subsequently labelled CVE-2024-1708.
Cloud customers have already had their instances updated, but on-premises customers must take action.
Read more on ScreenConnect: CISA Warns Against Malicious Use of Legitimate RMM Software
“Partners that are self-hosted or on-premises need to update their servers to version 23.9.8 immediately to apply a patch,” the vendor said. “We’ve received notifications of suspicious activity that our incident response team has investigated.”
Separately, Huntress CEO, Kyle Hanslovan, cited a US intelligence source as saying that initial access brokers currently exploiting the CVSS 10.0 bug will inevitably sell to ransomware actors.
“The sheer prevalence of this software and the access afforded by this vulnerability signals we are on the cusp of a ransomware free-for-all. Hospitals, critical infrastructure, and state institutions are proven at risk,” he warned.
“With remote access software, the bad guys can push ransomware as easily as the good guys can push a patch. And once they start pushing their data encryptors, I’d be willing to bet 90% of preventative security software won’t catch it because it’s coming from a trusted source.”
The Shadowserver Foundation claimed in a tweet yesterday that around 3800 ConnectWise ScreenConnect instances are still vulnerable to exploitation of both bugs.