← back

CVE-2024-1708

HIGH · 8.4 KEV EPSS 84.9%
hype ACTIVE HACK · 87 hack

KEV-confirmed exploitation; CISA recent addition; defender patching guidance evident.

What: Path-traversal vulnerability in ConnectWise ScreenConnect ≤23.9.7 enabling remote code execution or data breach; CVSS 8.4, EPSS 0.84.

Why it matters: KEV-listed as of 28 April 2026 with confirmed active exploitation in the wild. CISA formally added the flaw four days ago, signaling urgent defender action required across remote-access deployments.

Where it's seen: CISA KEV notice driving global awareness; multilingual security bulletins (English, Japanese) circulating on Bluesky; practitioner alerts advising immediate patching of exposed ScreenConnect instances; low current engagement relative to trending CVEs but high organizational impact.

RISK: CRITICAL — Actively exploited remote-access compromise; KEV-listed; RCE capability; high EPSS.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/2/2026, 3:44:37 PM

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

Public PoCs on GitHub 20 repos

Page 1 of 4

Articles & coverage 14 articles

  • CVE-2024-1709 & CVE-2024-1708: ConnectWise ScreenConnect Vulnerability Exploitations

    This blog explains how the new ConnectWise ScreenConnect vulnerabilities and their exploitation attacks work, as well as how organizations can defend against possible CVE-2024-1709 and CVE-2024-1708 exploitation attacks. We also strongly suggest simulating the ConnectWise ScreenConnect CVE-2024-1709 **and** CVE-2024-1708 **vulnerabilities** to test the effectiveness of your security controls again

  • ConnectWise ScreenConnect: CVE-2024-1708: Security Fix - Rapid7

    ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or

  • Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708) - Help Net Security

    # Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708). The two ScreenConnect vulnerabilities ConnectWise has recently urged customers to patch have finally been assigned CVE numbers: CVE-2024-1709 for the authentication bypass, CVE-2024-1708 for the path traversal flaw. ConnectWise has also released a newer version of ScreenConnect (v2

  • CVE-2024-1708: ConnectWise ScreenConnect Path Traversal

    # CVE-2024-1708: ConnectWise ScreenConnect Path Traversal. CVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect 23.9.7 and prior that enables remote code execution and unauthorized data access. ConnectWise ScreenConnect 23.9.7 and prior versions are affected by a path traversal vulnerability (CWE-22) that may allow an attacker the ability to execute remote code or directly

  • NVD - cve-2024-1708

    Change History 5 change records found show changes **CVE Modified by CVE 11/21/2024 3:51:08 AM** | Action | Type | Old Value | New Value | | --- | --- | --- | --- | | Added | Reference | | ``` https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 ``` | | Added | Reference | | ``` https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-scree

Page 1 of 3
NVD details 1 CWE ·1 vendor · 6 refs expand

Description

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

Weaknesses

Vendors

  • connectwise

Products

  • screenconnect

References

Top posts driving the trend