Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Unpatched ScreenConnect servers open to attack (CVE-2026-3564)
    Cybersecurity

    Unpatched ScreenConnect servers open to attack (CVE-2026-3564)

    adminBy adminMarch 21, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Unpatched ScreenConnect servers open to attack (CVE-2026-3564)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    ConnectWise has patched a critical vulnerability (CVE-2026-3564) that could enable attackers to hijack ScreenConnect sessions by abusing ASP.NET machine keys to forge trusted authentication.

    About CVE-2026-3564

    The ScreenConnect remote access platform is popular with managed service providers, IT departments, and technology solution providers. They can opt for the cloud-hosted version or can deploy it on their own servers or in their private cloud.

    CVE-2026-3564 stems from improper verification of cryptographic signature, can be exploited remotely by unauthenticated attackers without any user interaction needed, and affects all versions of ScreenConnect before version 26.1.

    “Earlier versions of ScreenConnect stored unique [ASP.NET] machine keys per instance within server configuration files, which under certain conditions could allow unauthorized actors to extract this material and misuse it for session authentication,” ConnectWise explained.

    After hijacking a session, they may use it to make unauthorized actions within the instance. Also, because ScreenConnect is used for managing remote devices, attackers may also open remote sessions to employee computers, run commands, install malware, etc.

    “ScreenConnect version 26.1 introduces enhanced protections for machine key handling, including encrypted storage and management, reducing the risk of unauthorized access in scenarios where server integrity may be compromised,” the company added.

    The new version also allows admins to easily regenerate instances’ cryptographic material.

    What to do?

    In a separate advisory, Connectwise mentioned that “security researchers have observed attempts to abuse disclosed ASP.NET machine key material,” but did not specify when.

    “We do not have evidence that [CVE-2026-3564] was exploited in ConnectWise-hosted ScreenConnect, so we do not have any confirmed IOCs to share,” a company spokesperson told Help Net Security.

    “We encourage any researchers who believe they have identified active exploitation to engage in responsible disclosure so findings can be validated and addressed appropriately.”

    Connectwise released Screenconnect v26.1 last week and updated the server instances it hosts in its cloud. Customers with on-premises and self-hosted instances are urged to upgrade as soon as possible.

    Organizations should also check for signs of prior compromise: unusual authentication activity and unexpected administrative actions showing in the ScreenConnect logs.

    Finally, Connectwise advises:

    • Reviewing instance-level and server-level access controls to restrict access to sensitive application configuration and secrets
    • Making sure that access to backups, exported configuration archives, and historical snapshots is limited to trusted users and systems
    • Using only trusted and supported extensions and regularly updating them.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Attack CVE20263564 open ScreenConnect Servers Unpatched
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis Massive Data Breach Leaked 2.7 Million Social Security Numbers
    Next Article 6 things I want to see from the rumored reMarkable Paper Pure
    admin
    • Website

    Related Posts

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    Opera’s browsers just picked up a new AI feature that’s actually useful

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (822)
    • Tech Tools & Mobile / Apps (1,605)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026
    Most Popular
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.