CVE-2023-25718
Summary
| CVE | CVE-2023-25718 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-02-13 20:15:00 UTC |
| Updated | 2023-11-07 04:09:00 UTC |
| Description | ** DISPUTED ** In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior." |
Risk And Classification
Problem Types: CWE-347
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Connectwise | Control | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Proof Of Concept: Connectwise Control Screenconnect Signed Executable to Arbitrary Code Execution via ARP Poisoning / DNS Hijacking / Unsanitized Client Parameters or Host Headers with CVE-2020-3147 (Cisco Sx / SMB Series Switches) - CYBIR - Cyber Security, Incident Response, & Digital Forensics | MISC | cybir.com | |
| Clearing the Air: Overblown Claims of Vulnerabilities, Exploits & Severity | MISC | www.huntress.com | |
| The Importance of Responsible Security Disclosures | MISC | www.connectwise.com | |
| MSP Technology | IT Management Software | ConnectWise | MISC | www.connectwise.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.