HomeConnectwiseCVE-2025-11492

CVE-2025-11492

CRITICAL
9.6CVSS
Published: 2025-10-16
Updated: 2025-10-29
AI Analysis

Description

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

CVSS Metrics

Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
adjacent network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-319

Metadata

Primary Vendor
CONNECTWISE
Published
10/16/2025
Last Modified
10/29/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

connectwise : automate

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief