CVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
AI Analysis
Technical Summary
CVE-2025-11492 is a critical security vulnerability identified in the ConnectWise Automate Agent, a widely used IT management and monitoring platform. The core issue arises from the agent's ability to be configured to communicate with its server over HTTP rather than HTTPS, resulting in the cleartext transmission of sensitive information. This vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive data. When HTTP is used, an attacker positioned on the network path between the agent and server can perform man-in-the-middle (MitM) attacks. Such an attacker can intercept sensitive data, modify commands or responses, or replay previously captured traffic to disrupt operations or gain unauthorized access. The vulnerability affects all versions of ConnectWise Automate prior to the 2025.9 release. The 2025.9 patch enforces HTTPS for all agent communications and updates the encryption method previously used to obfuscate some HTTP traffic, effectively mitigating the risk. The CVSS v3.1 score of 9.6 reflects the vulnerability's critical nature, with an attack vector requiring only adjacent network access, no privileges or user interaction, and impacting confidentiality, integrity, and availability on a wide scale. Although no known exploits are reported in the wild yet, the ease of exploitation and potential impact make this a high-priority issue for organizations using this software.
Potential Impact
The impact of CVE-2025-11492 is significant for organizations relying on ConnectWise Automate for IT management and monitoring. The cleartext transmission of sensitive information exposes credentials, configuration data, and operational commands to interception and manipulation by attackers. This can lead to unauthorized access to managed systems, data breaches, disruption of IT operations, and potential lateral movement within networks. The ability to modify or replay traffic further increases the risk of persistent compromise and operational sabotage. Given ConnectWise Automate's role in managing large IT environments, exploitation could affect numerous endpoints and critical infrastructure components simultaneously, amplifying the damage. Organizations in sectors with high reliance on managed IT services, such as finance, healthcare, government, and large enterprises, face elevated risks. Additionally, the vulnerability could undermine trust in managed service providers (MSPs) using this tool, impacting business continuity and regulatory compliance.
Mitigation Recommendations
To mitigate CVE-2025-11492, organizations should immediately upgrade ConnectWise Automate Agents and servers to version 2025.9 or later, which enforces HTTPS for all communications and updates encryption methods. It is critical to audit current configurations to ensure no agents are operating over HTTP. Network segmentation and monitoring should be employed to detect anomalous traffic patterns indicative of MitM attacks. Deploying network-level protections such as TLS inspection and strict firewall rules can help prevent unauthorized interception. Additionally, organizations should implement certificate pinning where possible to prevent attackers from using fraudulent certificates. Regularly reviewing and updating security policies to mandate encrypted communications for all management tools is essential. Finally, conducting penetration testing and vulnerability assessments focused on management infrastructure can help identify residual risks.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, Japan, France, Netherlands, Sweden, Singapore
CVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
Description
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11492 is a critical security vulnerability identified in the ConnectWise Automate Agent, a widely used IT management and monitoring platform. The core issue arises from the agent's ability to be configured to communicate with its server over HTTP rather than HTTPS, resulting in the cleartext transmission of sensitive information. This vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive data. When HTTP is used, an attacker positioned on the network path between the agent and server can perform man-in-the-middle (MitM) attacks. Such an attacker can intercept sensitive data, modify commands or responses, or replay previously captured traffic to disrupt operations or gain unauthorized access. The vulnerability affects all versions of ConnectWise Automate prior to the 2025.9 release. The 2025.9 patch enforces HTTPS for all agent communications and updates the encryption method previously used to obfuscate some HTTP traffic, effectively mitigating the risk. The CVSS v3.1 score of 9.6 reflects the vulnerability's critical nature, with an attack vector requiring only adjacent network access, no privileges or user interaction, and impacting confidentiality, integrity, and availability on a wide scale. Although no known exploits are reported in the wild yet, the ease of exploitation and potential impact make this a high-priority issue for organizations using this software.
Potential Impact
The impact of CVE-2025-11492 is significant for organizations relying on ConnectWise Automate for IT management and monitoring. The cleartext transmission of sensitive information exposes credentials, configuration data, and operational commands to interception and manipulation by attackers. This can lead to unauthorized access to managed systems, data breaches, disruption of IT operations, and potential lateral movement within networks. The ability to modify or replay traffic further increases the risk of persistent compromise and operational sabotage. Given ConnectWise Automate's role in managing large IT environments, exploitation could affect numerous endpoints and critical infrastructure components simultaneously, amplifying the damage. Organizations in sectors with high reliance on managed IT services, such as finance, healthcare, government, and large enterprises, face elevated risks. Additionally, the vulnerability could undermine trust in managed service providers (MSPs) using this tool, impacting business continuity and regulatory compliance.
Mitigation Recommendations
To mitigate CVE-2025-11492, organizations should immediately upgrade ConnectWise Automate Agents and servers to version 2025.9 or later, which enforces HTTPS for all communications and updates encryption methods. It is critical to audit current configurations to ensure no agents are operating over HTTP. Network segmentation and monitoring should be employed to detect anomalous traffic patterns indicative of MitM attacks. Deploying network-level protections such as TLS inspection and strict firewall rules can help prevent unauthorized interception. Additionally, organizations should implement certificate pinning where possible to prevent attackers from using fraudulent certificates. Regularly reviewing and updating security policies to mandate encrypted communications for all management tools is essential. Finally, conducting penetration testing and vulnerability assessments focused on management infrastructure can help identify residual risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ConnectWise
- Date Reserved
- 2025-10-08T11:25:59.180Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f143fc9f8a5dbaeaf964b2
Added to database: 10/16/2025, 7:14:04 PM
Last enriched: 2/27/2026, 4:36:49 AM
Last updated: 3/26/2026, 6:11:32 AM
Views: 581
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.