Glitch effect

AMA: Breaking Down the ConnectWise ScreenConnect Vulnerability (CVE-2024-1708 & CVE-2024-1709)

Download Your

On-Demand Webinar

Watch the Webinar

By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download Your

On-Demand Webinar

Watch the Webinar

down arrow
down arrow
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effectGlitch effect

On February 19, 2024, ConnectWise published a security advisory for ScreenConnect version 23.9.8 referencing two critical vulnerabilities. On that same day, Huntress security researchers got to work analyzing this threat and successfully recreated a proof-of-concept exploit demonstrating its impact.

Join the Huntress team (and some special guests) live for an AMA-style discussion on ScreenConnect’s vulnerabilities (CVE-2024-1708 and CVE-2024-1709) and what’s being done to address them. We’ll highlight our analysis efforts, the technical details behind this attack, and answer any questions the community might have. In this rapid response webinar, we’ll cover:

  • An explanation of what the vulnerabilities are and how easy they are to exploit
  • Guidance on detecting malicious activity related to these vulnerabilities
  • Insight into the gravity of this event and its implications for SMBs
  • Questions from the community where nothing is off limits

On February 19, 2024, ConnectWise published a security advisory for ScreenConnect version 23.9.8 referencing two critical vulnerabilities. On that same day, Huntress security researchers got to work analyzing this threat and successfully recreated a proof-of-concept exploit demonstrating its impact.

Join the Huntress team (and some special guests) live for an AMA-style discussion on ScreenConnect’s vulnerabilities (CVE-2024-1708 and CVE-2024-1709) and what’s being done to address them. We’ll highlight our analysis efforts, the technical details behind this attack, and answer any questions the community might have. In this rapid response webinar, we’ll cover:

  • An explanation of what the vulnerabilities are and how easy they are to exploit
  • Guidance on detecting malicious activity related to these vulnerabilities
  • Insight into the gravity of this event and its implications for SMBs
  • Questions from the community where nothing is off limits

Generic Headshot Profile
Kyle Hanslovan
Co-founder & CEO, Huntress
Linkedin icon
Generic Headshot Profile
John Hammond
Senior Security Researcher, Huntress
Linkedin icon
Generic Headshot Profile
Matt Kiely
Principal Product Researcher, Huntress
Linkedin icon
Generic Headshot Profile
Wes Spencer
Co-founder, Empath
Linkedin icon
Generic Headshot Profile
Jason Slagle
President, CNWR, Inc.
Linkedin icon

AMA: Breaking Down the ConnectWise ScreenConnect Vulnerability (CVE-2024-1708 & CVE-2024-1709)

Glitch effectGlitch effectGlitch effect
Share

On February 19, 2024, ConnectWise published a security advisory for ScreenConnect version 23.9.8 referencing two critical vulnerabilities. On that same day, Huntress security researchers got to work analyzing this threat and successfully recreated a proof-of-concept exploit demonstrating its impact.

Join the Huntress team (and some special guests) live for an AMA-style discussion on ScreenConnect’s vulnerabilities (CVE-2024-1708 and CVE-2024-1709) and what’s being done to address them. We’ll highlight our analysis efforts, the technical details behind this attack, and answer any questions the community might have. In this rapid response webinar, we’ll cover:

  • An explanation of what the vulnerabilities are and how easy they are to exploit
  • Guidance on detecting malicious activity related to these vulnerabilities
  • Insight into the gravity of this event and its implications for SMBs
  • Questions from the community where nothing is off limits

Blurry glitch effect