{"uuid": "e86dd9f3-4176-430e-8345-8ee68c7293b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25719", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8354", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25719\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).\n\ud83d\udccf Published: 2023-02-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T14:54:25.416Z\n\ud83d\udd17 References:\n1. https://www.connectwise.com\n2. https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/\n3. https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity\n4. https://www.connectwise.com/blog/cybersecurity/the-importance-of-responsible-security-disclosures", "creation_timestamp": "2025-03-21T15:19:35.000000Z"}