ConnectWise, a leading provider of remote management and cyber protection tools for managed service providers (MSPs), is set to implement a significant security update affecting ScreenConnect, ConnectWise Automate, and ConnectWise RMM.
The action, scheduled for June 13, 2025, at 8:00 p.m. ET, follows concerns raised by third-party security researchers regarding how earlier versions of ScreenConnect handled certain configuration data without any compromise detected in ConnectWise’s systems or digital certificates.
This move is part of ConnectWise’s robust response to evolving security standards and the proactive hardening of its products. Certificate rotation, a standard but critical security practice, helps minimize the risk of digital certificate misuse if a private key were ever exposed.
The certificates in question are used to digitally sign code and updates, ensuring that only legitimate, verified software is installed and updated on customer endpoints and servers.
Certificate Rotation and Product Updates
All affected ConnectWise products will receive new code signing certificates. This process involves:
Code signing certificates are a core security control, binding the identity of the software distributor to the code. In practice, this means that, for example, ScreenConnect and Automate agents will no longer trust code signed with the old certificate. Here’s a simplified example of how such verification might look in code (using pseudocode for illustration):
python# Sample pseudocode for certificate verification in agent code
if verify_code_signature(module, current_cert):
allow_execution(module)
else:
log_alert("Invalid signature detected!")
block_execution()
ConnectWise is also updating how configuration data is managed within ScreenConnect. Previously, certain configuration data could be manipulated if not handled securely. The new updates introduce additional validation and integrity checks, ensuring that only valid configurations can be stored and loaded. For example:
text# Example of improved configuration data storage (conceptual)
{
"config_key": "value",
"signature": "<secure_signature_of_config_key_and_value>"
}
This ensures that even if configuration data is stored or transmitted, it cannot be tampered with without detection.
ConnectWise has made detailed instructions available through its University portal, including:
For on-premises environments, the update process is simple:
For cloud environments:
Resources and Support
ConnectWise is committed to minimizing disruption and providing support throughout the transition:
ConnectWise’s decision to rotate code signing certificates and enhance configuration data management is a clear example of proactive security governance.
By requiring updates before June 13, 2025, ConnectWise is ensuring that its partners and customers continue to benefit from robust, secure remote management tools.
Both on-premises and cloud customers must act to ensure compliance and maintain uninterrupted service. For detailed instructions and support, visit the ConnectWise University portal.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…