Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4676-8cx2-xvgq

Опубликовано: 16 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.6

Описание

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

EPSS

Процентиль: 1%
0.00008
Низкий

9.6 Critical

CVSS3

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 9.6
nvd
4 месяца назад

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

CVSS3: 9.6
fstec
4 месяца назад

Уязвимость платформы для удаленного мониторинги и управления ConnectWise Automate, связанная с передачей критичной информации открытым текстом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 1%
0.00008
Низкий

9.6 Critical

CVSS3

Дефекты

CWE-319