### [CVE-2024-1708](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1708) ![](https://img.shields.io/static/v1?label=Product&message=ScreenConnect&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. ### POC #### Reference - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass #### Github - https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE - https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/netlas-io/netlas-dorks - https://github.com/nitish778191/fitness_app - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tr1pl3ight/POCv2.0-for-CVE-2024-1709 - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc