Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate

0
Critical
VulnerabilityCVE-2025-11492cvecve-2025-11492cwe-319
Published: Thu Oct 16 2025 (10/16/2025, 18:59:35 UTC)
Source: CVE Database V5
Vendor/Project: ConnectWise
Product: Automate

Description

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:27:06 UTC

Technical Analysis

CVE-2025-11492 is a critical security vulnerability identified in the ConnectWise Automate Agent, a widely used IT management and automation platform. The core issue stems from the agent's ability to be configured to communicate with its server over HTTP rather than HTTPS, resulting in cleartext transmission of sensitive information. This cleartext transmission (classified under CWE-319) exposes the communication channel to on-path attackers who can intercept, modify, or replay the data exchanged between the agent and the server. The vulnerability does not require authentication or user interaction, but an attacker must have a man-in-the-middle (MitM) network position, such as being on the same local network or controlling a network node between the agent and server. The impact is severe, as the intercepted data could include credentials, commands, or other sensitive operational information, compromising confidentiality, integrity, and availability of managed systems. The vendor addressed this vulnerability in the 2025.9 patch by updating the encryption method and enforcing HTTPS for all agent communications, eliminating the possibility of fallback to unencrypted HTTP. No known exploits are reported in the wild yet, but the high CVSS score of 9.6 indicates a critical risk if exploited. Organizations running versions prior to 2025.9 remain vulnerable and should prioritize remediation.

Potential Impact

For European organizations, the impact of CVE-2025-11492 is significant. ConnectWise Automate is commonly used by managed service providers (MSPs) and IT departments to automate system management, patching, and monitoring. Exploitation could allow attackers to intercept sensitive operational data, inject malicious commands, or disrupt IT management workflows, potentially leading to widespread system compromise or downtime. Confidentiality breaches could expose credentials and internal network details, facilitating further lateral movement or data exfiltration. Integrity violations could result in unauthorized changes to managed endpoints, while availability impacts could disrupt critical IT services. Given the critical CVSS score and the widespread use of ConnectWise Automate in Europe, especially in countries with mature IT service sectors, the threat poses a substantial risk to business continuity and data protection compliance, including GDPR obligations. The lack of required authentication or user interaction lowers the barrier for attackers with network access, increasing the urgency for mitigation.

Mitigation Recommendations

1. Immediately upgrade all ConnectWise Automate Agents and servers to version 2025.9 or later, which enforces HTTPS and updates encryption methods. 2. Audit current configurations to ensure no agents are allowed to communicate over HTTP; disable any fallback or legacy protocols. 3. Implement network segmentation to limit exposure of agent-server communications to trusted network segments only. 4. Deploy network monitoring and intrusion detection systems to identify unusual traffic patterns indicative of MitM attacks or replay attempts. 5. Use strong TLS configurations and certificate validation to prevent downgrade or spoofing attacks. 6. Educate IT staff and MSPs on the importance of secure communication channels and timely patching. 7. Review and update incident response plans to include scenarios involving compromised IT management tools. 8. Consider deploying endpoint detection and response (EDR) solutions to detect anomalous agent behavior that may result from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
ConnectWise
Date Reserved
2025-10-08T11:25:59.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f143fc9f8a5dbaeaf964b2

Added to database: 10/16/2025, 7:14:04 PM

Last enriched: 1/7/2026, 7:27:06 PM

Last updated: 1/18/2026, 10:47:55 AM

Views: 391

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats