CVE-2026-3564:
CVE-2026-3564
A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scen...
Overview
A critical security flaw has been identified in ScreenConnect. This vulnerability, tracked as CVE-2026-3564, is an authentication bypass that could allow a malicious actor to gain unauthorized and elevated access to the system.
Vulnerability Explained
In simple terms, this flaw exists in how ScreenConnect handles certain authentication processes. If an attacker manages to obtain specific cryptographic keys or material from the server (for example, through a prior server compromise or misconfiguration), they can misuse this material to trick the system. The system would then incorrectly authenticate the attacker, granting them access as if they were a legitimate, privileged user without needing a valid password or token.
Potential Impact
The impact of this vulnerability is severe. Successful exploitation could lead to:
- Full System Compromise: Attackers could gain administrative control over the ScreenConnect server.
- Unauthorized Access: They could access and control all client machines connected to the vulnerable server.
- Data Theft and Espionage: Sensitive information, session data, and files on connected endpoints could be stolen.
- Pivot Point: A compromised ScreenConnect server is often used as a foothold to launch further attacks deeper into a corporate network.
With a CVSS score of 9.0 (Critical), this flaw represents a significant risk to any organization using an unpatched version of ScreenConnect.
Remediation and Mitigation
Immediate action is required to protect your systems.
- Patch Immediately: The primary and most effective mitigation is to apply the official security update provided by ConnectWise for ScreenConnect. Update to the latest patched version without delay. Consult the official ConnectWise security bulletin for version specifics.
- Restrict Access: Ensure your ScreenConnect server is not publicly exposed to the internet unless absolutely necessary. If remote access is required, place it behind a VPN with strong authentication.
- Review Server Security: Harden the underlying server hosting ScreenConnect. Ensure strong, unique credentials, principle of least privilege, and that no unnecessary cryptographic material is exposed in file stores or logs.
- Monitor for Anomalies: Increase monitoring of authentication logs and user sessions on your ScreenConnect server for any suspicious activity, such as logins from unexpected locations or at unusual times.
Staying current with patches is the best defense. For context on how critical vulnerabilities are actively exploited, you can read about recent campaigns: Apple Backports Critical WebKit Patch for Older iOS Devices Under Active Exploit and the Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attack...
JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to version 0.3.5+1, a vulnerability in jose could allow an unauthenticated, remote attacker to forge valid JWS/JWT tokens by us...
OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Una...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...