On March 20, 2026, ConnectWise released a security patch for a critical vulnerability in its ScreenConnect remote access software. The flaw, tracked as CVE-2026-3564, is an improper verification of a cryptographic signature that allows an unauthenticated attacker to extract sensitive key material. This key can be used to forge authentication tokens, bypass access controls, and hijack active remote sessions. Given ScreenConnect's prevalence among Managed Service Providers (MSPs), a compromise could lead to widespread downstream attacks on MSP clients. ConnectWise has released version 26.1 to address the issue and strongly recommends all users update immediately.
CVE-2026-356426.1.The vulnerability's root cause is the insecure storage and handling of ASP.NET machine keys in older versions of ScreenConnect.
CVE-2026-3564 flaw allows an unauthenticated attacker to remotely query the server in a specific way that causes it to disclose this key material.T1539 - Steal Web Session Cookie).The impact is magnified in an MSP environment. A single compromised ScreenConnect server could give an attacker remote access to hundreds or thousands of endpoints across all of the MSP's clients, creating a massive supply chain risk.
At the time of disclosure, ConnectWise stated it had no evidence that CVE-2026-3564 itself was being exploited in the wild. However, they noted that security researchers had observed threat actors attempting to abuse the general technique of misusing exposed ASP.NET machine keys. This indicates that the vulnerability is of a type that is actively being sought and exploited by attackers, making patching extremely urgent.
26.1.26.1 or later. This is the highest priority.Immediately update all ScreenConnect instances to the patched version 26.1 or later.
After patching, use the new functionality to regenerate the instance's cryptographic material to invalidate any previously exposed keys.
Restrict access to the ScreenConnect management interface to only trusted IP addresses.
ConnectWise releases ScreenConnect version 26.1 to patch CVE-2026-3564.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.