
[CIVN-2026-0153] Security Bypass Vulnerability in ScreenConnect
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Security Bypass Vulnerability in ScreenConnect
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
ScreenConnect versions prior to 26.1
Overview
A vulnerability has been reported in ScreenConnect, which could allow a remote attacker to gain elevated access or bypass security restrictions on the targeted system.
Target Audience:
All end-user organizations and individuals using affected ScreenConnect versions.
Risk Assessment:
High risk of unauthorized access to data.
Impact Assessment:
Potential for unauthorized session access and exposure of sensitive data.
Description
ScreenConnect is a remote access and support software that enables users to connect to and manage devices remotely.
This vulnerability exists in ScreenConnect due to improper verification of cryptographic signature . In affected versions, server-level cryptographic material (machine keys) stored in configuration files could be exposed under certain conditions. An attacker who obtains this material may misuse it for session authentication.
Successful exploitation of this vulnerability could allow a remote attacker to bypass authentication controls, gain unauthorized access to active sessions, or escalate privileges on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://www.connectwise.com/company/trust/security-bulletins/2026-03-17-screenconnect-bulletin
Vendor Information
Connectwise
https://www.connectwise.com/company/trust/security-bulletins/2026-03-17-screenconnect-bulletin
References
Connectwise
https://www.connectwise.com/company/trust/security-bulletins/2026-03-17-screenconnect-bulletin
CVE Name
CVE-2026-3564
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnD7UwACgkQ3jCgcSdc
ys+SVQ//dUt4lrceR5lxFo/CSG7rMHULdGEkD9AYqjp7D8BHiG/ROq2EwdV1ypUM
KmO42gk0h1zQCQfawiwYI+F4NAhIfzIq9S4sHvAzb1HANMlNPMiCcAOr+ocQ0JkZ
FDKlGhk8xWBqI8hlQECdzGGoi3B1GcudFe3uL53ULRFGmhzonhQvgofgcYJvmiid
YHdvVfsM6KFoso791DettATKg6sDJCTL/H7+wEtN3qD7hCfHfY7vwCn51bLVdCwg
TkxxWGCkB/KdH9XdUqcjdsXZQCvkW3CeP89fnm/fa+hr33yNNn3SMylzHFkAHFu4
IbAK96a9mpPx96/pauKJEsjxB5xFp+R1oohnedZk6W6XLPMEpcNnsdmDJNU9H7AT
kM1+MFzIOYvlFu4L20TGgAksZ8boLjYOtsN0BBf+xM5/xlIvVAOZPfViLSZfS2oV
T7LWjWWdJvW3F0t4Kmqzow0urvJ6fQvSAv9bc9D3H1HkNCfIQ6Bx5sMRe8MpArrD
L9E3uu4dK/FKHKsHkj6Z/o8dsA/umusjzh+ix7f4rL/xLzNlh8aTlt26FkZ/Y/kN
o6MOz4TzUmD3W5IySvVmpARhIS7qFUvTO00g7tZyPeJdRsRlQuwZoClnIgh6DlSd
7KGADouOiQ7iKS53AjnhKzQZurDYQzoWhy4C9xhuhwp3SpJzTss=
=83f+
—–END PGP SIGNATURE—–


