The February 2024 Self Hosted Screen Connect Vulnerability Explained

Ғылым және технология

lawrence.video/
Huntress Rapid Response Write Up
- www.huntress.com/blog/vulnera...
Connectwise Bulletin
- www.connectwise.com/company/t...
Patrick Beggs LinkedIn Post
- www.linkedin.com/posts/patric...
Connectwise Control Patch Details
- screenconnect.product.connect...
My Previous Video on their interaction with Bishop Fox
- • ConnectWise Control: V...
Connecting With Us
---------------------------------------------------
+ Hire Us For A Project: lawrencesystems.com/hire-us/
+ Tom Twitter 🐦 / tomlawrencetech
+ Our Web Site www.lawrencesystems.com/
+ Our Forums forums.lawrencesystems.com/
+ Instagram / lawrencesystems
+ Facebook / lawrencesystems
+ GitHub github.com/lawrencesystems/
+ Discord / discord
Lawrence Systems Shirts and Swag
---------------------------------------------------
►👕 lawrence.video/swag/
AFFILIATES & REFERRAL LINKS
---------------------------------------------------
Amazon Affiliate Store
🛒 www.amazon.com/shop/lawrences...
UniFi Affiliate Link
🛒 store.ui.com?a_aid=LTS
All Of Our Affiliates that help us out and can get you discounts!
🛒 lawrencesystems.com/partners-...
Gear we use on Kit
🛒 kit.co/lawrencesystems
Use OfferCode LTSERVICES to get 10% off your order at
🛒 www.techsupplydirect.com?aff=2
Digital Ocean Offer Code
🛒 m.do.co/c/85de8d181725
HostiFi UniFi Cloud Hosting Service
🛒 hostifi.net/?via=lawrencesystems
Protect you privacy with a VPN from Private Internet Access
🛒 www.privateinternetaccess.com...
Patreon
💰 / lawrencesystems
Chapters
00:00 ScreenConnect Vulnerability
00:28 What is ScreenConnect
01:13 ScreenConnect Self Hosted
02:11 Vulnerability Demonstration
03:29 The Patch and Connectwise Response

Пікірлер: 40

  • @DPCTechnology
    @DPCTechnology3 ай бұрын

    Every month when I feel like I'm sending in the mortgage payment for a chalet in The Alps to Huntress. I remind myself of days like this... Bravo once again to the team over there...

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    3 ай бұрын

    Yes, Huntress was right on top of this making them an easy source to cite.

  • @StevenLastname

    @StevenLastname

    3 ай бұрын

    Huntress is expensive, but definitely worth it in my opinion. They've saved my clients on a couple of occasions in the last couple years!

  • @DPCTechnology

    @DPCTechnology

    3 ай бұрын

    @@StevenLastname yeah, when you add in the fact that they do managed AV with defender it actually is pretty reasonable... We just have a gazillion seats.. at the end of the day it's all about how good it does at detecting things and avoiding catastrophe.. well worth the insurance payment in my book....

  • @DPCTechnology

    @DPCTechnology

    3 ай бұрын

    @@LAWRENCESYSTEMS yeah I came stomping in the office telling everybody to get on it when I saw it online and they said " already patched, huntress alerted us hours ago"

  • @Agnemons

    @Agnemons

    3 ай бұрын

    Insurance is always a complete waste of money. UNTIL you need it. Then, if you haven't got it, it's a complete waste of time trying to get it.@@DPCTechnology

  • @itandgeneral4308
    @itandgeneral43083 ай бұрын

    We appreciate your mission to raise security awareness. Thank you for keeping us informed.

  • @andrewr7820
    @andrewr78203 ай бұрын

    Tom, Props for you to doing a PSA for events like this. You are a genuine asset to the IT community and their users everywhere. Thank you!

  • @BigHeadClan
    @BigHeadClan3 ай бұрын

    The MSP I work for uses screen connect (as our backup Remote access solution) our ITSec guys are awesome and all over it the day it was announced. Pushed a script to uninstall it from every computer in our Management tool and simply reinstalled with the latest version on the machines that still did need it for vendors. My condolences to those IT departments for local schools and stuff they are unlikely to be setup in a way to easily roll out such a change.

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    3 ай бұрын

    Great that they were on top of it.

  • @pjaz6800
    @pjaz68003 ай бұрын

    Your live stream saved my instance. Small restaurant company, was able to get it off before I could get hit. Thank you for your awesome content.

  • @IM_A_BEAR_LOL
    @IM_A_BEAR_LOL3 ай бұрын

    I had just updated the morning before the patch was released. I didn't hear about the exploit or need to patch until your livestream video, so thank you!

  • @06TundraLTD
    @06TundraLTD3 ай бұрын

    self-hosted server since 2014, one of the best tools I bought

  • @Monarchias

    @Monarchias

    2 ай бұрын

    But the Cloud! They all say it's easy and cheap! Any iterations. On the other hand what is yours is yours. More responsibility? Yes.

  • @AndrewHargreave
    @AndrewHargreave3 ай бұрын

    Thanks for this! I'm also one who's had the self-hosted version since 2011 (and I've paid for subscription updates each year). I had tried to patch my self-hosted instance back in Oct but the patch broke my setup for some reason. I restored back to the working version (yay backups!) and told myself to come back to it when I had more time to troubleshoot. Well, that time didn't come. I wasn't able to discern from the emails sent on the detail that they were invalidating the licenses for those not patched so I spent an inordinate amount of time yesterday getting patched to the current version. I got it working but thought I had actually been infected (running multiple scans with no results had me worried)....now I realize they just blocked my server from validating the license which blocked my access. So your video has eased my mind quite a bit! Thanks!

  • @jordancalhouncom
    @jordancalhouncom3 ай бұрын

    Thankful for your live stream the other was able to see the thumbnail and immediately patch our systems! Crazy teams don’t keep on the latest versions with the generous discount they offer to renew a license for such a powerful tool for them and bad actors

  • @deathvaps
    @deathvaps3 ай бұрын

    Gracias por la informacion, saludos desde Colombia!

  • @f-s-r
    @f-s-r3 ай бұрын

    It looks like nowadays everything that is as exposed as this would need automatic updates.

  • @thompsonmatthew

    @thompsonmatthew

    3 ай бұрын

    Spot on. Regrettably, I predict the company will just use this as an excuse to go cloud-only.

  • @MJGZ51
    @MJGZ513 ай бұрын

    Thanks, Tom for the heads-up. I watched your live stream. I'm not sure how they're allowing the bypassing of existing license validation. I'm on version 6 from 2017 (like many - it worked and I didn't need the newer features) and it will not allow my to upgrade.

  • @QuantumKurator
    @QuantumKurator3 ай бұрын

    This shows the advantage of going with the SaaS version vs self-hosted, but I get there are pros and cons both types of platforms.

  • @kennethjames2512
    @kennethjames25123 ай бұрын

    I updated because of the video you released on Tuesday, Thank you. I never received an email from screenconnect even though the email is in the users.xml file. This was a scary exploit

  • @brandonwaldman5496
    @brandonwaldman54963 ай бұрын

    I appreciate your video :)

  • @raniljaramillo9821
    @raniljaramillo98212 ай бұрын

    Hi Tom I'm amazed how you get informed of the new security issues, what sites are following or subscribe to?

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    2 ай бұрын

    I use FreshRSS and I have a lot of news sites kzread.info/dash/bejne/qZejyI-Hn8vVabQ.htmlsi=_Ym3NNxBtaVz8293

  • @mathesonstep
    @mathesonstep3 ай бұрын

    I think they took the best course of action, I really like that they are forcing people to upgrade

  • @MelodicMurder
    @MelodicMurder3 ай бұрын

    Do you have any info on the change healthcare hack?

  • @edelbeneatp
    @edelbeneatp3 ай бұрын

    Great video. I do cringe every time I hear "on premise" though, hah. It always cracks me up how shortening premises to prem has made people think that it means premise.

  • @strikesbac
    @strikesbac3 ай бұрын

    @Tom what solution are you using for your customers?

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    3 ай бұрын

    We use ScreenConnect / Connectwise Control

  • @strikesbac

    @strikesbac

    3 ай бұрын

    @@LAWRENCESYSTEMS Ahh cool. To be honest I was slightly concerned, we had been using AnyDesk and with their recent breach decided to move. Most of the feedback I’d had suggested that SC was a good alternative, I was just about to buy it when the CVE was announced! I thought it was prudent to see how they handled it before deciding.

  • @scoovyspoh891
    @scoovyspoh8913 ай бұрын

    👍

  • @wpochert
    @wpochert2 ай бұрын

    they refuse to update or patch the linux version.. because 3 years ago they stopped releasing new versions for linux. ..there are TONS of self hosted linux instances of screenconnect out there... windows based vps are alot more expensive than linux. Connectwise needs to do the right thing and patch their last linux release.

  • @user-lm3ll1jp7f
    @user-lm3ll1jp7f2 ай бұрын

    Are you staying with ScreenConnect/Connectwise?

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    2 ай бұрын

    For now, yes.

  • @user-lm3ll1jp7f

    @user-lm3ll1jp7f

    2 ай бұрын

    @@LAWRENCESYSTEMS ok, cool, is it known who spotted this in the wild and reported it?

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    2 ай бұрын

    @@user-lm3ll1jp7f It was reported to Connectwise by someone who did not want to have their name known.

Келесі