HomeConnectwiseCVE-2025-3935

CVE-2025-3935

HIGH
8.1CVSS
Published: 2025-04-25
Updated: 2025-10-24
AI Analysis

Description

ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-502

Metadata

Primary Vendor
CONNECTWISE
Published
4/25/2025
Last Modified
10/24/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

connectwise : screenconnect

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-3935 | HIGH Severity | CVEDatabase.com | CVEDatabase.com