Filtered by vendor Connectwise Subscriptions
Filtered by product Automate Subscriptions
Total 10 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2026-6066 1 Connectwise 1 Automate 2026-04-20 7.1 High
ConnectWise has released a security update for ConnectWise Automate™ that addresses a behavior in the ConnectWise Automate Solution Center where certain client-to-server communications could occur without transport-layer encryption. This could allow network‑based interception of Solution Center traffic in Automate deployments. The issue has been resolved in Automate 2026.4 by enforcing secure communication for affected Solution Center connections.
CVE-2025-11492 1 Connectwise 1 Automate 2026-02-26 9.6 Critical
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
CVE-2025-11493 1 Connectwise 1 Automate 2026-02-26 8.8 High
The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492.
CVE-2023-47256 1 Connectwise 2 Automate, Screenconnect 2025-06-17 5.5 Medium
ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings
CVE-2023-47257 1 Connectwise 2 Automate, Screenconnect 2025-05-07 8.1 High
ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.
CVE-2023-23130 1 Connectwise 1 Automate 2024-11-21 5.9 Medium
Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
CVE-2023-23126 1 Connectwise 1 Automate 2024-11-21 6.1 Medium
Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.
CVE-2021-35066 1 Connectwise 1 Automate 2024-11-21 9.8 Critical
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
CVE-2020-15838 1 Connectwise 1 Automate 2024-11-21 8.8 High
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
CVE-2020-15027 1 Connectwise 1 Automate 2024-11-21 9.8 Critical
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.