A trivially exploited authentication bypass in ConnectWise ScreenConnect — requiring nothing more than appending a slash to a URL — hands attackers SYSTEM-level control over entire managed IT networks, and ransomware crews are already cashing in.

A threat actor with even rudimentary skills can completely seize control of an organization's entire remote IT management infrastructure by typing a single extra character into a web browser's address bar. That is not hyperbole — that is the reality of CVE-2024-1709 and its companion flaw CVE-2024-1708, a chained vulnerability pair in ConnectWise ScreenConnect that security researchers have dubbed "SlashAndGrab." With a perfect CVSS score of 10.0, active exploitation confirmed by both ConnectWise's own incident response team and CISA, and ransomware-as-a-service operations already weaponizing it at scale, this is the kind of vulnerability that keeps managed service providers awake at night — and for very good reason.
On February 13, 2024, ConnectWise received a vulnerability report disclosing two serious security flaws in its ScreenConnect remote desktop and support software. The company moved quickly, releasing patches just six days later on February 19, 2024 — but the attackers moved faster. According to threat intelligence corroborated by Huntress Security and Microsoft, exploitation of the authentication bypass component (CVE-2024-1709) was observed in the wild as early as February 14, 2024 — the very day after the vulnerability was reported to the vendor, and five days before a public patch even existed.
ConnectWise ScreenConnect is a widely deployed Remote Monitoring and Management (RMM) tool and remote desktop platform used primarily by Managed Service Providers (MSPs) — the companies that manage IT infrastructure for hundreds or even thousands of downstream business clients. Compromising a single ScreenConnect server does not just hand an attacker control over one organization. It hands them the keys to every client machine, every network, and every endpoint that MSP manages. The blast radius of a single successful exploit here is not measured in servers — it is measured in entire corporate ecosystems.
CISA formally added CVE-2024-1708 (the path traversal component) to its Known Exploited Vulnerabilities (KEV) catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1708) on April 28, 2026, following a high-tempo wave of Medusa ransomware operations attributed to the threat actor tracked as Storm-1175 (also known as Octo Tempest) that specifically leveraged this vulnerability chain as a primary initial access vector, according to a Microsoft Security Blog post published April 6, 2026 (https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/). The vulnerability's older companion, CVE-2024-1709, had already been in the KEV catalog, marking both flaws as federally mandated patching priorities for U.S. government agencies.
To understand why this vulnerability is so dangerous, it helps to understand what ScreenConnect's setup wizard is supposed to do — and why it should never be accessible on an already-configured system.
When ScreenConnect is first installed, it presents administrators with a setup wizard at the URL path /SetupWizard.aspx. This wizard allows the administrator to create the first administrative account on the system. Once the system is configured, this wizard is supposed to be locked away — inaccessible to anyone, because allowing unauthenticated users to run the setup wizard on an already-configured system is functionally equivalent to leaving a "create new superuser" form open on the public internet.
The problem, as researchers at Huntress Security discovered and documented (https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass), is that the authentication check protecting that wizard was embarrassingly fragile.
The authentication check in vulnerable versions of ScreenConnect (ScreenConnect.Web.dll, specifically the SetupModule/ISetupHandler components) worked like this: it checked whether the incoming request URL string exactly matched /SetupWizard.aspx. If it did, and the system was already configured, access was denied.
But ASP.NET — the Microsoft web framework ScreenConnect is built on — has a feature called Request.PathInfo. When a URL like /SetupWizard.aspx/anything is received, ASP.NET splits this into two parts:
Request.Path → /SetupWizard.aspxRequest.PathInfo → /anythingThe vulnerable authentication code was checking the full URL string, which now reads /SetupWizard.aspx/anything and no longer exactly matches /SetupWizard.aspx. The check fails to recognize this as the setup wizard, so it waves the request through. But ASP.NET still routes the request to the setup wizard handler — because as far as the routing engine is concerned, SetupWizard.aspx is still the target page, just with some extra path info appended.
The result: any unauthenticated attacker on the internet can access the fully functional setup wizard of any already-configured, publicly exposed ScreenConnect instance simply by appending a slash and any arbitrary text to the URL.
1GET /SetupWizard.aspx/literallyanything HTTP/1.12Host: victim-screenconnect-server.example.comThat is the entire exploit for the authentication bypass. One HTTP request. No credentials. No special tooling. No exploitation framework. Just a URL with a trailing slash and some garbage text.
The authentication bypass (CVE-2024-1709, CVSS 10.0) is devastating on its own, but it is almost always chained with a second flaw: CVE-2024-1708, a path traversal vulnerability (CWE-22) with a CVSS score of 8.4, which is the subject of this KEV addition.
ScreenConnect supports extensions — essentially plugins that administrators can install to extend the platform's functionality. These extensions are delivered as ZIP archives. In vulnerable versions, the code that handles extracting these ZIP archives fails to properly validate the file paths contained within the archive. This is a well-known class of vulnerability called ZipSlip: an attacker crafts a malicious ZIP file in which internal file entries contain path traversal sequences (e.g., ../../) that, when extracted, cause files to be written outside the intended target directory.
In this specific case, the intended extraction directory is a sandboxed subdirectory within C:\Program Files (x86)\ScreenConnect\App_Extensions\[extension-id]\. But a maliciously crafted extension archive can break out of that subdirectory and write files directly to the root of C:\Program Files (x86)\ScreenConnect\App_Extensions\.
Why does that matter? Because files placed in the App_Extensions root — particularly .aspx or .ashx web-accessible script files — are served and executed by the ScreenConnect web server with SYSTEM-level privileges. An attacker who writes a web shell to that location can then send HTTP requests to it and receive arbitrary command execution as the most privileged account on the Windows operating system.
Putting both vulnerabilities together produces a seamless, end-to-end attack chain that takes a threat actor from zero access to full SYSTEM-level control with no credentials, no user interaction, and trivial technical skill:
Step 1 — Reconnaissance: The attacker scans the internet for publicly exposed ConnectWise ScreenConnect instances running version 23.9.7 or earlier. Shodan, Censys, and similar tools make this trivially easy at scale.
Step 2 — Authentication Bypass (CVE-2024-1709): The attacker sends an HTTP GET or POST request to /SetupWizard.aspx/[any arbitrary string]. This bypasses the authentication check and presents the attacker with the fully functional setup wizard.
1POST /SetupWizard.aspx/pwned HTTP/1.12Host: victim-screenconnect-server.example.com3Content-Type: application/x-www-form-urlencoded45[Setup wizard form data to create new admin user]Step 3 — Rogue Administrator Creation: Using the setup wizard interface, the attacker creates a new administrative user account. This action completely overwrites the ScreenConnect internal user database, instantly deleting every legitimate local administrator account on the system. Legitimate administrators are locked out of their own infrastructure in the same moment the attacker gains access to it.
Step 4 — Administrative Login: The attacker logs into the ScreenConnect management interface using the freshly created rogue administrative account.
Step 5 — Malicious Extension Upload (CVE-2024-1708 / ZipSlip): The attacker crafts a malicious ScreenConnect extension ZIP archive containing a web shell (e.g., an .aspx or .ashx file) with path traversal sequences in the archive's internal file paths. They upload this via the legitimate Extensions Management feature, now accessible with admin credentials.
Step 6 — Path Traversal File Write: Instead of extracting to the sandboxed extension subdirectory, the ZipSlip vulnerability causes the web shell to be written to the root of C:\Program Files (x86)\ScreenConnect\App_Extensions\, where it is directly web-accessible.
Step 7 — Remote Code Execution as SYSTEM: The attacker sends HTTP requests to the newly planted web shell. The ScreenConnect web server executes the embedded .NET code with SYSTEM privileges, completing the escalation from zero access to full operating system control.
Step 8 — Persistence, Lateral Movement, and Ransomware Deployment: With SYSTEM-level access to the ScreenConnect server and its RMM capabilities, the attacker establishes persistent backdoors, pivots to downstream client endpoints, exfiltrates data, and deploys ransomware payloads across the entire managed client base.
According to analysis by Huntress and ConnectWise's own advisory, the following specific software components are affected:
ScreenConnect.Web.dll (specifically the SetupModule / ISetupHandler event handler registration — the home of the flawed authentication check)SetupWizard.aspx (the setup page that should be inaccessible on configured instances)ScreenConnect.Core.dllScreenConnect.Server.dllScreenConnect Web Server ServiceScreenConnect Security Manager ServiceConnectWise | ScreenConnect Server | 23.9.7 and all prior versions | 23.9.8, 23.9.10 |
ConnectWise | ScreenConnect Server | 22.4 through 23.9.7 | 23.9.8, 23.9.10 |
ConnectWise | ScreenConnect Server | 22.11.10 and prior | 23.9.8, 23.9.10 |
ConnectWise | ScreenConnect Server | 21.11.14 and prior | 23.9.8, 23.9.10 |
ConnectWise | ScreenConnect Server | 20.11.26 and prior | 23.9.8, 23.9.10 |
ConnectWise | ScreenConnect Server | Off-maintenance partners (legacy versions) | 22.4.20001 (interim free patch) |
Critical clarification: These vulnerabilities affect only the ScreenConnect server software — the central management application. ScreenConnect client agents installed on end-user machines are not directly vulnerable to these flaws and do not require updates to prevent exploitation of the server. However, that distinction offers cold comfort: an attacker who owns the server owns every endpoint those clients connect to.
ConnectWise cloud-hosted instances (those running on screenconnect.com or hostedrmm.com domains) were automatically mitigated server-side by ConnectWise within 48 hours of vulnerability validation, with no action required from administrators. Subsequent upgrades to version 23.9.8 on cloud infrastructure were also fully automated. The acute risk here falls entirely on self-hosted, on-premises ScreenConnect deployments — a significant portion of the MSP market.
This is not a theoretical vulnerability. Exploitation in the wild was confirmed by ConnectWise's own Incident Response team and corroborated by CISA's addition of CVE-2024-1709 to the KEV catalog. According to Huntress, the first observed exploitation occurred on February 14, 2024 — one day after the vendor was notified and five days before public disclosure or a patch was available. This suggests threat actors may have independently discovered the vulnerability or had early access to vulnerability details through channels that remain unclear.
Known indicators of compromise tied to early exploitation campaigns include the following IP addresses, confirmed as attacker infrastructure by ConnectWise incident response:
155.133.5.15155.133.5.14118.69.65.60Perhaps most alarming is the threat actor profile now associated with this vulnerability chain. According to a Microsoft Security Blog published April 6, 2026 (https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/), the threat actor Storm-1175 — also tracked in the industry as Octo Tempest, a sophisticated, financially motivated group known for high-impact extortion operations — has been actively leveraging the CVE-2024-1709/CVE-2024-1708 vulnerability chain as a primary initial access vector in high-tempo Medusa Ransomware-as-a-Service (RaaS) operations.
Medusa is a prolific ransomware operation that operates under a RaaS model, recruiting affiliates to conduct intrusions while the core group provides the ransomware tooling and manages victim negotiations. Storm-1175's use of ScreenConnect as an entry point is tactically shrewd: by compromising a single MSP's ScreenConnect server, an affiliate can potentially deploy ransomware across dozens or hundreds of that MSP's client organizations in a single coordinated operation — maximizing damage while minimizing the number of intrusions needed to achieve massive scale.
This attack vector — compromising MSP tooling to reach downstream clients — has become a signature tactic for ransomware operations targeting the managed services sector, reminiscent of the Kaseya VSA attack in 2021. The SlashAndGrab vulnerability lowers the bar for executing this style of attack to essentially zero technical skill.
A successful exploitation of CVE-2024-1709 chained with CVE-2024-1708 against a managed service provider's ScreenConnect instance produces a catastrophic cascade:
The CVSS 10.0 score on CVE-2024-1709 — the maximum possible rating — reflects all of this: network-accessible, no authentication required, no user interaction required, and a changed scope affecting resources beyond the vulnerable component itself (all managed client endpoints).
If your organization operates a self-hosted ConnectWise ScreenConnect instance, the following actions are not optional. They are urgent.
Conduct an immediate audit of all self-hosted ScreenConnect installations across your environment. Version information is visible in the ScreenConnect administrative console. Any instance running version 23.9.7 or earlier is vulnerable and must be treated as potentially compromised until proven otherwise.
Upgrade all vulnerable on-premises instances to version 23.9.8 or later. ConnectWise has also released version 23.9.10 as a subsequent update.
Critical warning: ScreenConnect upgrades must follow specific sequential version progression paths. Attempting to jump directly from a very old version to 23.9.8 without following the required path may fail. ConnectWise documents the mandatory upgrade sequence as:
2.1 → 2.5 → 3.1 → 4.4 → 5.4 → 19.2 → 22.8 → 23.3 → 23.9.8+
Skipping steps in this sequence can result in a failed upgrade, leaving the system vulnerable.
For off-maintenance partners (organizations whose ScreenConnect support contracts have lapsed and who cannot access the latest versions): ConnectWise has temporarily removed license restrictions to allow all partners to install the interim patched version 22.4.20001 at no charge. This patch is available at the ConnectWise ScreenConnect community forums (https://screenconnect.product.connectwise.com/communities/26/topics/3980-connectwise-control-224).
If you encounter license errors during the upgrade process, ConnectWise has documented the following workaround:
C:\Program Files (x86)\ScreenConnect\App_Data\License.xml to your Desktop.License.xml back to C:\Program Files (x86)\ScreenConnect\App_Data\.Note that this workaround requires a brief service interruption.
Patching a potentially compromised system without first investigating for attacker presence is dangerous — you may patch the vulnerability while leaving a backdoor in place. Before returning any patched ScreenConnect server to production, perform the following checks:
Check the administrative user database:
Inspect the App_Extensions directory for web shells:
C:\Program Files (x86)\ScreenConnect\App_Extensions\..aspx or .ashx files located directly in the root of this directory (not within named extension subdirectories). These files should not be there under normal circumstances and are a high-confidence indicator of web shell deployment via the ZipSlip path traversal.Review IIS access logs for exploitation attempts:
SetupWizard.aspx that contain trailing path segments (e.g., SetupWizard.aspx/ followed by any text).SetupWizard.aspx/* (where * is any trailing string).Check Windows Event Logs for user creation activity:
Check for suspicious file modifications in App_Extensions:
C:\Program Files (x86)\ScreenConnect\App_Extensions\ that do not correspond to known, legitimate extension installations.Hunt for known attacker IP addresses in network logs:
Review with EDR tooling:
ScreenConnect.Service.exe spawning cmd.exe, powershell.exe, or other unexpected child processes).If your ScreenConnect deployment is hosted on ConnectWise's cloud infrastructure (domains ending in screenconnect.com or hostedrmm.com), ConnectWise automatically applied server-side mitigations within 48 hours of validating the vulnerability, with no action required on your part. Subsequent version upgrades to 23.9.8 on cloud infrastructure were also handled automatically. However, it is still advisable to review administrative user accounts and extension directories as a precautionary measure.
The SlashAndGrab vulnerability is, in many ways, a perfect storm of bad outcomes converging: a maximally severe flaw, in maximally consequential software, exploited at maximum speed by sophisticated ransomware operators. But beyond the immediate crisis, this incident illuminates several structural problems in the managed services and RMM ecosystem that deserve sustained attention.
RMM tools are ransomware's favorite highway. The same capabilities that make platforms like ScreenConnect invaluable to MSPs — centralized access to hundreds of client endpoints, the ability to push software and execute commands at scale — make them catastrophically attractive targets for ransomware affiliates. A single compromised RMM server is worth more to an attacker than hundreds of individually compromised workstations. The security community has been raising this concern for years. SlashAndGrab is the latest, most visceral demonstration of why it matters.
Authentication mechanisms deserve more scrutiny than they receive. The root cause of CVE-2024-1709 — a string comparison check that failed to account for ASP.NET's Request.PathInfo behavior — is the kind of subtle, easy-to-miss flaw that can survive years of code review. It is a reminder that security-critical access control logic requires adversarial testing, not just functional testing. "Does the check work when I access the wizard normally?" is a fundamentally different question than "Are there any ways to access the wizard that circumvent this check?"
The ZipSlip class of vulnerabilities remains widespread and underappreciated. CVE-2024-1708's path traversal mechanism — using crafted ZIP archive entries to write files outside the intended extraction directory — is a vulnerability class with a long history and continued prevalence across many software platforms. Any application that extracts ZIP files should be on the ZipSlip watchlist.
Patch velocity matters enormously. The window between vulnerability validation (February 13) and the first confirmed exploitation (February 14) in this case was essentially zero. Organizations operating on patch cycles measured in weeks or months are fundamentally outpaced by modern threat actors. For internet-exposed, critical-infrastructure-adjacent tools like RMM platforms, patch timelines must be measured in hours, not days.
For administrators who have not yet acted: the time to patch is not when your incident response firm is on the phone. It is right now. And for those in the security community building the next generation of RMM tools: this is a blueprint for what a catastrophic RMM vulnerability looks like. Study it carefully.