CVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
AI Analysis
Technical Summary
CVE-2025-11492 is a critical security vulnerability identified in the ConnectWise Automate Agent, a widely used IT management and automation platform. The core issue stems from the agent's ability to be configured to communicate with its server over HTTP rather than HTTPS, resulting in cleartext transmission of sensitive information. This cleartext transmission (classified under CWE-319) exposes the communication channel to on-path attackers who can intercept, modify, or replay the data exchanged between the agent and the server. The vulnerability does not require authentication or user interaction, but an attacker must have a man-in-the-middle (MitM) network position, such as being on the same local network or controlling a network node between the agent and server. The impact is severe, as the intercepted data could include credentials, commands, or other sensitive operational information, compromising confidentiality, integrity, and availability of managed systems. The vendor addressed this vulnerability in the 2025.9 patch by updating the encryption method and enforcing HTTPS for all agent communications, eliminating the possibility of fallback to unencrypted HTTP. No known exploits are reported in the wild yet, but the high CVSS score of 9.6 indicates a critical risk if exploited. Organizations running versions prior to 2025.9 remain vulnerable and should prioritize remediation.
Potential Impact
For European organizations, the impact of CVE-2025-11492 is significant. ConnectWise Automate is commonly used by managed service providers (MSPs) and IT departments to automate system management, patching, and monitoring. Exploitation could allow attackers to intercept sensitive operational data, inject malicious commands, or disrupt IT management workflows, potentially leading to widespread system compromise or downtime. Confidentiality breaches could expose credentials and internal network details, facilitating further lateral movement or data exfiltration. Integrity violations could result in unauthorized changes to managed endpoints, while availability impacts could disrupt critical IT services. Given the critical CVSS score and the widespread use of ConnectWise Automate in Europe, especially in countries with mature IT service sectors, the threat poses a substantial risk to business continuity and data protection compliance, including GDPR obligations. The lack of required authentication or user interaction lowers the barrier for attackers with network access, increasing the urgency for mitigation.
Mitigation Recommendations
1. Immediately upgrade all ConnectWise Automate Agents and servers to version 2025.9 or later, which enforces HTTPS and updates encryption methods. 2. Audit current configurations to ensure no agents are allowed to communicate over HTTP; disable any fallback or legacy protocols. 3. Implement network segmentation to limit exposure of agent-server communications to trusted network segments only. 4. Deploy network monitoring and intrusion detection systems to identify unusual traffic patterns indicative of MitM attacks or replay attempts. 5. Use strong TLS configurations and certificate validation to prevent downgrade or spoofing attacks. 6. Educate IT staff and MSPs on the importance of secure communication channels and timely patching. 7. Review and update incident response plans to include scenarios involving compromised IT management tools. 8. Consider deploying endpoint detection and response (EDR) solutions to detect anomalous agent behavior that may result from exploitation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Ireland, Italy
CVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
Description
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
AI-Powered Analysis
Technical Analysis
CVE-2025-11492 is a critical security vulnerability identified in the ConnectWise Automate Agent, a widely used IT management and automation platform. The core issue stems from the agent's ability to be configured to communicate with its server over HTTP rather than HTTPS, resulting in cleartext transmission of sensitive information. This cleartext transmission (classified under CWE-319) exposes the communication channel to on-path attackers who can intercept, modify, or replay the data exchanged between the agent and the server. The vulnerability does not require authentication or user interaction, but an attacker must have a man-in-the-middle (MitM) network position, such as being on the same local network or controlling a network node between the agent and server. The impact is severe, as the intercepted data could include credentials, commands, or other sensitive operational information, compromising confidentiality, integrity, and availability of managed systems. The vendor addressed this vulnerability in the 2025.9 patch by updating the encryption method and enforcing HTTPS for all agent communications, eliminating the possibility of fallback to unencrypted HTTP. No known exploits are reported in the wild yet, but the high CVSS score of 9.6 indicates a critical risk if exploited. Organizations running versions prior to 2025.9 remain vulnerable and should prioritize remediation.
Potential Impact
For European organizations, the impact of CVE-2025-11492 is significant. ConnectWise Automate is commonly used by managed service providers (MSPs) and IT departments to automate system management, patching, and monitoring. Exploitation could allow attackers to intercept sensitive operational data, inject malicious commands, or disrupt IT management workflows, potentially leading to widespread system compromise or downtime. Confidentiality breaches could expose credentials and internal network details, facilitating further lateral movement or data exfiltration. Integrity violations could result in unauthorized changes to managed endpoints, while availability impacts could disrupt critical IT services. Given the critical CVSS score and the widespread use of ConnectWise Automate in Europe, especially in countries with mature IT service sectors, the threat poses a substantial risk to business continuity and data protection compliance, including GDPR obligations. The lack of required authentication or user interaction lowers the barrier for attackers with network access, increasing the urgency for mitigation.
Mitigation Recommendations
1. Immediately upgrade all ConnectWise Automate Agents and servers to version 2025.9 or later, which enforces HTTPS and updates encryption methods. 2. Audit current configurations to ensure no agents are allowed to communicate over HTTP; disable any fallback or legacy protocols. 3. Implement network segmentation to limit exposure of agent-server communications to trusted network segments only. 4. Deploy network monitoring and intrusion detection systems to identify unusual traffic patterns indicative of MitM attacks or replay attempts. 5. Use strong TLS configurations and certificate validation to prevent downgrade or spoofing attacks. 6. Educate IT staff and MSPs on the importance of secure communication channels and timely patching. 7. Review and update incident response plans to include scenarios involving compromised IT management tools. 8. Consider deploying endpoint detection and response (EDR) solutions to detect anomalous agent behavior that may result from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ConnectWise
- Date Reserved
- 2025-10-08T11:25:59.180Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f143fc9f8a5dbaeaf964b2
Added to database: 10/16/2025, 7:14:04 PM
Last enriched: 1/7/2026, 7:27:06 PM
Last updated: 1/18/2026, 10:47:55 AM
Views: 391
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumCVE-2025-15535: NULL Pointer Dereference in nicbarker clay
MediumCVE-2026-1059: SQL Injection in FeMiner wms
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.