On March 20, 2026, ConnectWise released a security patch for a critical vulnerability in its ScreenConnect remote access software. The flaw, tracked as CVE-2026-3564, is an improper verification of a cryptographic signature that allows an unauthenticated attacker to extract sensitive key material. This key can be used to forge authentication tokens, bypass access controls, and hijack active remote sessions. Given ScreenConnect's prevalence among Managed Service Providers (MSPs), a compromise could lead to widespread downstream attacks on MSP clients. ConnectWise has released version 26.1 to address the issue and strongly recommends all users update immediately.
CVE-2026-356426.1.The vulnerability's root cause is the insecure storage and handling of ASP.NET machine keys in older versions of ScreenConnect.
CVE-2026-3564 flaw allows an unauthenticated attacker to remotely query the server in a specific way that causes it to disclose this key material.T1539 - Steal Web Session Cookie).The impact is magnified in an MSP environment. A single compromised ScreenConnect server could give an attacker remote access to hundreds or thousands of endpoints across all of the MSP's clients, creating a massive supply chain risk.
At the time of disclosure, ConnectWise stated it had no evidence that CVE-2026-3564 itself was being exploited in the wild. However, they noted that security researchers had observed threat actors attempting to abuse the general technique of misusing exposed ASP.NET machine keys. This indicates that the vulnerability is of a type that is actively being sought and exploited by attackers, making patching extremely urgent.
26.1.26.1 or later. This is the highest priority.Immediately update all ScreenConnect instances to the patched version 26.1 or later.
After patching, use the new functionality to regenerate the instance's cryptographic material to invalidate any previously exposed keys.
Restrict access to the ScreenConnect management interface to only trusted IP addresses.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats