Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3564: CWE-347 Improper Verification of Cryptographic Signature in ConnectWise ScreenConnect

0
Critical
VulnerabilityCVE-2026-3564cvecve-2026-3564cwe-347
Published: Tue Mar 17 2026 (03/17/2026, 14:48:59 UTC)
Source: CVE Database V5
Vendor/Project: ConnectWise
Product: ScreenConnect

Description

CVE-2026-3564 is a critical vulnerability in ConnectWise ScreenConnect versions prior to 26. 1 involving improper verification of cryptographic signatures (CWE-347). An attacker with access to server-level cryptographic material used for authentication can exploit this flaw to gain unauthorized access and potentially elevate privileges. The vulnerability affects confidentiality, integrity, and availability, with a CVSS score of 9. 0, indicating high severity and a complex but impactful attack vector. No known exploits are currently reported in the wild. Organizations using ScreenConnect should prioritize patching to version 26. 1 or later once available and implement strict controls around cryptographic key access. Countries with significant use of ConnectWise ScreenConnect and high reliance on remote support tools, including the United States, Canada, United Kingdom, Germany, Australia, and Japan, are most at risk. Immediate mitigation and monitoring are essential to prevent potential compromise of remote support infrastructure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:13:23 UTC

Technical Analysis

CVE-2026-3564 identifies a critical security vulnerability in ConnectWise ScreenConnect, a widely used remote support and remote access software. The flaw stems from improper verification of cryptographic signatures (CWE-347), which compromises the authentication process. Specifically, if an attacker gains access to the server-level cryptographic material—such as private keys or signing certificates used to authenticate sessions—they can exploit this vulnerability to bypass authentication controls. This can lead to unauthorized access, including privilege escalation within the ScreenConnect environment. The vulnerability affects all versions prior to 26.1, with a CVSS 3.1 base score of 9.0, reflecting a network attack vector with high impact on confidentiality, integrity, and availability, and no user interaction required. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. Although no exploits have been reported in the wild yet, the critical nature of the flaw and the sensitivity of remote access tools make this a high-risk issue. The improper signature verification could allow attackers to forge or manipulate authentication tokens or session data, undermining trust in the remote access sessions and potentially enabling lateral movement within affected networks. This vulnerability highlights the importance of robust cryptographic validation and secure key management in remote access solutions.

Potential Impact

The impact of CVE-2026-3564 is severe for organizations relying on ConnectWise ScreenConnect for remote support and administration. Exploitation can lead to unauthorized access to critical systems, enabling attackers to escalate privileges and potentially control remote endpoints or servers. This compromises confidentiality by exposing sensitive data accessible through remote sessions, integrity by allowing manipulation of session data or commands, and availability by potentially disrupting remote support services. Given the widespread use of ScreenConnect in IT service management, managed service providers, and enterprise environments, a successful attack could facilitate broader network compromise, data breaches, or ransomware deployment. The vulnerability's exploitation could also undermine trust in remote support operations, impacting business continuity and regulatory compliance. Organizations without strict cryptographic key management or monitoring may be particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2026-3564, organizations should immediately plan to upgrade ConnectWise ScreenConnect to version 26.1 or later once the patch is released. Until then, restrict access to server-level cryptographic materials by enforcing strict access controls, including multi-factor authentication and role-based access controls for administrators managing these keys. Implement robust key management practices such as hardware security modules (HSMs) or secure vaults to protect private keys. Monitor logs and network traffic for unusual authentication attempts or anomalies in remote session behavior. Employ network segmentation to limit the exposure of the ScreenConnect server and isolate it from critical infrastructure. Conduct regular audits of cryptographic assets and review permissions to ensure no unauthorized access. Additionally, consider deploying endpoint detection and response (EDR) solutions to detect lateral movement or privilege escalation attempts stemming from compromised remote sessions. Educate IT staff on the risks associated with cryptographic key exposure and enforce strict operational security policies around remote access tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ConnectWise
Date Reserved
2026-03-04T20:04:12.757Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b96f91771bdb1749ba8fa0

Added to database: 3/17/2026, 3:13:21 PM

Last enriched: 3/25/2026, 1:13:23 AM

Last updated: 4/30/2026, 3:15:25 PM

Views: 172

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses