Skip to content
Tech News
← Back to articles

ConnectWise patches new flaw allowing ScreenConnect hijacking

read original get ConnectWise ScreenConnect Security Patch → more articles
Why This Matters

The vulnerability in ScreenConnect highlights the critical importance of robust cryptographic protections in remote access platforms, especially given their widespread use by MSPs and IT teams. Addressing this flaw is essential to prevent unauthorized access and potential data breaches, safeguarding both enterprise and consumer data. Prompt updates and vigilance are vital as threat actors are actively attempting to exploit this vulnerability in the wild.

Key Takeaways

ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege escalation.

The flaw affects ScreenConnect versions before 26.1. It is tracked as CVE-2026-3564 and received a critical severity score.

ScreenConnect is a remote access platform typically used by managed service providers (MSPs), IT departments, and support teams. It can be either cloud-hosted by ConnectWise or on-premise on the customer's server.

An attacker could exploit the security issue to extract and use the ASP.NET machine keys for unauthorized session authentication.

“If the machine key material for a ScreenConnect instance is disclosed, a threat actor may be able to generate or modify protected values in ways that may be accepted by the instance as valid,” reads the vendor’s advisory.

“This can result in unauthorized access and unauthorized actions within ScreenConnect.”

The vendor addressed this by adding stronger protection for machine keys, including encrypted storage and improved handling starting ScreenConnect version 26.1.

Cloud users have been automatically moved to the safe version, but system administrators managing on-premises deployments must upgrade to version 26.1 as soon as possible.

ConnectWise also stated that researchers observed attempts to abuse disclosed ASP.NET machine key material in the wild, so the risk from CVE-2026-3564 is tangible right now.

However, the vendor told BleepingComputer that it has no evidence of active exploitation in the wild as of writing, and therefore has no indicators of compromise (IoCs) to share with defenders.

... continue reading