Critical ScreenConnect flaw can let attackers misuse server authentication material


ConnectWise has disclosed a critical ScreenConnect vulnerability that could let attackers gain unauthorized access if they obtain server-level cryptographic material used for authentication. The flaw, tracked as CVE-2026-3564, affects ScreenConnect versions earlier than 26.1 and carries a CVSS 3.1 score of 9.0.

The issue centers on how older ScreenConnect releases handled machine key material tied to each instance. ConnectWise says earlier versions stored unique machine keys in server configuration files, which under certain conditions could allow unauthorized actors to extract and misuse that material for session authentication.

That makes this a serious problem for on-premises deployments. If the cryptographic material becomes accessible, a threat actor may be able to generate or modify protected values that the application treats as trusted, which can lead to unauthorized actions inside the ScreenConnect instance, including elevated access and access to active sessions.

Why this ScreenConnect bug matters

This vulnerability does not read like a simple remote code execution bug, but it still creates a dangerous path for compromise. ConnectWise classifies it under CWE-347, which covers improper verification of cryptographic signatures, and says the flaw can affect confidentiality, integrity, and availability if abused.

The vendor has also marked the issue as Priority 1 High. In its bulletin, ConnectWise says vulnerabilities in this class should be treated as emergency changes or patched as soon as possible, usually within days.

ConnectWise separately noted that security researchers have observed attempts to abuse disclosed ASP.NET machine key material more broadly. The company says ScreenConnect uses instance-specific cryptographic material, but if that material is exposed, an attacker may be able to forge or modify trusted values and perform unauthorized actions within the instance.

What ConnectWise changed in version 26.1

ConnectWise says ScreenConnect 26.1 adds stronger protections for machine key handling, including encrypted storage and management. The company also says the update improves protection for instance cryptographic material, enables on-demand regeneration of instance cryptographic material through an administrative action, and strengthens application integrity.

That update reduces the risk tied to disclosed authentication material and shortens the window in which exposed keys could be abused. ConnectWise frames the release as part of a broader security hardening effort for ScreenConnect authentication trust.

Who needs to act now

Cloud-hosted ScreenConnect customers do not need to take action. ConnectWise says no action is required for cloud deployments because the mitigation has already been applied on the backend.

On-premises ScreenConnect users need to upgrade to version 26.1. ConnectWise says partners should download and apply the update through the official ScreenConnect download page, and customers with lapsed maintenance will need to renew before installing the latest supported release.

ScreenConnect CVE-2026-3564 at a glance

ItemDetails
VulnerabilityCVE-2026-3564
ProductConnectWise ScreenConnect
Affected versionsVersions prior to 26.1
Fixed version26.1
CVSS score9.0
CWECWE-347
Cloud customersNo action required
On-prem customersUpgrade to 26.1

What admins should do next

  • Upgrade on-premises ScreenConnect servers to version 26.1 immediately.
  • Review who can access ScreenConnect server configuration data and cryptographic material.
  • Audit ScreenConnect logs for unusual authentication behavior or suspicious session activity.
  • Regenerate instance cryptographic material where appropriate after updating.
  • Treat exposed machine key material as a potential compromise event.

FAQ

What is CVE-2026-3564?

It is a critical ScreenConnect vulnerability involving server-level cryptographic material used for authentication. If that material becomes accessible, an attacker may be able to gain unauthorized access and perform actions inside the instance.

Which ScreenConnect versions are affected?

ConnectWise says all ScreenConnect versions before 26.1 are affected.

Do cloud users need to patch?

No. ConnectWise says cloud-hosted deployments require no action.

What should on-premises users do?

Upgrade to ScreenConnect 26.1 as soon as possible and review logs for suspicious authentication activity.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages