Vulnerabilities
Vulnerable Software
Connectwise:  >> Automate  >> 2020.0  Security Vulnerabilities
The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492.
CVSS Score
8.8
EPSS Score
0.0
Published
2025-10-16
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
CVSS Score
9.6
EPSS Score
0.0
Published
2025-10-16
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-06-21
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
CVSS Score
8.8
EPSS Score
0.002
Published
2020-10-09
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
CVSS Score
9.8
EPSS Score
0.004
Published
2020-07-16


Contact Us

Shodan ® - All rights reserved