On February 9, 2026, ConnectWise released a security patch for its ScreenConnect remote access software, addressing two severe vulnerabilities. The most critical of these, CVE-2026-1014, is an authentication bypass with a CVSS score of 10.0, allowing attackers to create administrative accounts on unpatched servers. It can be chained with a second flaw, CVE-2026-1219, a path traversal vulnerability (CVSS 8.4), to achieve unauthenticated remote code execution (RCE).
Security firms, including Huntress, have confirmed active, in-the-wild exploitation of these vulnerabilities. Threat actors are leveraging the flaws to compromise servers, deploy malicious payloads, and establish persistence. Due to the widespread use of ScreenConnect by Managed Service Providers (MSPs), this vulnerability poses a significant supply chain risk, potentially giving attackers access to thousands of downstream customer networks. The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-1014 to its Known Exploited Vulnerabilities (KEV) catalog, mandating immediate remediation for federal agencies. All organizations using on-premise ScreenConnect versions 23.9.7 and older are urged to upgrade to version 23.9.8 or newer immediately or take their servers offline.
The attack leverages a chain of two distinct vulnerabilities to achieve full system compromise.
This critical vulnerability resides in the setup process of the ScreenConnect application. An attacker can bypass authentication checks by accessing a specific setup wizard URL (/SetupWizard.aspx) on an already-configured instance. This flaw allows the attacker to create a new user with full administrative privileges, effectively gaining complete control over the ScreenConnect server.
This high-severity vulnerability allows an authenticated user to upload files to arbitrary locations on the server's filesystem. After gaining administrative access via CVE-2026-1014, an attacker can exploit this path traversal flaw to upload a malicious payload, such as a web shell or a malware dropper, into a web-accessible directory.
/SetupWizard.aspx endpoint to exploit T1190 - Exploit Public-Facing Application (CVE-2026-1014).T1078 - Valid Accounts.malicious.aspx).App_Extensions/ directory, making it a persistent T1505.003 - Web Shell.screenconnect.com or hostedrmm.com have already been patched.As of February 10, 2026, active exploitation is widespread. Security researchers at Huntress and other firms have observed threat actors scanning for and compromising vulnerable servers. CISA's inclusion of CVE-2026-1014 in the KEV catalog on February 10th confirms its status as an actively exploited threat. The ease of exploitation (low complexity, no user interaction) makes it a prime target for opportunistic and sophisticated attackers alike.
The impact of a successful exploit is severe. Attackers gain full administrative control over the ScreenConnect server, which can lead to:
Given the function of ScreenConnect as a privileged remote access tool, these vulnerabilities represent a worst-case scenario for many organizations, particularly MSPs.
While specific attacker IPs and hashes are dynamic, the following indicators are consistent with exploitation activity.
C:\Program Files (x86)\ScreenConnect\App_Extensions\[Random_GUID]\Security teams should hunt for the following activity patterns:
url_pattern/SetupWizard.aspxfile_pathC:\Program Files (x86)\ScreenConnect\App_Extensions\.aspx, .ashx, .dll, or .exe files.process_nameScreenConnect.Service.execmd.exe, powershell.exe, or certutil.exe.log_sourceScreenConnect Web Server Logs/SetupWizard.aspx.command_line_patternpowershell.exe -e/SetupWizard.aspx. Any successful access (HTTP 200) should be treated as a compromise.C:\Program Files (x86)\ScreenConnect\App_Extensions\ directory for any suspicious or recently added files. A legitimate extension will be in a folder with a corresponding manifest file. A standalone .aspx file is highly suspicious. Reference D3FEND File Analysis techniques.ScreenConnect.Service.exe. Baseline normal behavior and alert on deviations. Reference D3FEND Process Analysis.If a compromise is suspected, isolate the server from the network immediately and begin incident response procedures.
The primary and most effective mitigation is to apply the security patch provided by ConnectWise immediately.
Mapped D3FEND Techniques:
Restrict network access to the ScreenConnect web interface to only trusted IP addresses as a temporary compensating control.
Mapped D3FEND Techniques:
If the server cannot be patched, isolate it from the internet entirely by blocking all inbound traffic at the network perimeter.
Mapped D3FEND Techniques:
Use EDR or similar tools to monitor for anomalous behavior originating from the ScreenConnect process, such as spawning command shells.
Mapped D3FEND Techniques:
The most critical and effective defense is to immediately apply the security patch from ConnectWise. All on-premise ScreenConnect instances must be upgraded to version 23.9.8 or a later version. This action directly remediates both the CVE-2026-1014 authentication bypass and the CVE-2026-1219 path traversal vulnerabilities, closing the attack vector entirely. Prioritize internet-facing servers for this update. Create a snapshot or backup of the server before applying the update as a rollback precaution. After patching, verify the version number in the ScreenConnect web interface to confirm the update was successful. Do not consider any other mitigation a permanent substitute for patching. This is a time-sensitive action, as automated exploitation is widespread.
As a temporary, compensating control until patching can be completed, implement strict inbound traffic filtering at your network perimeter firewall. Create rules that only allow access to the ScreenConnect web interface (typically TCP port 8040 and/or 443) from known, trusted IP addresses, such as corporate VPN gateways or specific administrative subnets. Deny all other inbound traffic to this service from the internet. This drastically reduces the attack surface by preventing unknown external attackers from reaching the vulnerable endpoint. While this is a valuable short-term measure, it is not foolproof, as an attacker could potentially compromise a trusted source. This should only be used to buy time for patching, not as a long-term solution.
For detection and hunting, deploy and configure an Endpoint Detection and Response (EDR) solution to monitor process lineage on the ScreenConnect server. Specifically, create detection rules that alert on the ScreenConnect.Service.exe process spawning suspicious child processes. Normal operation should not involve this service launching cmd.exe, powershell.exe, certutil.exe, or other living-off-the-land binaries. Establishing a baseline of normal process activity for the ScreenConnect service is key. An alert on an anomalous child process is a high-confidence indicator of post-exploitation activity and should trigger an immediate incident response investigation. Ensure process creation logging (Windows Event ID 4688) is enabled and forwarded to a SIEM for analysis.
Implement File Integrity Monitoring (FIM) on the ScreenConnect server, focusing on the application's installation directories. The primary target for monitoring is the C:\Program Files (x86)\ScreenConnect\App_Extensions\ directory. Attackers are known to drop web shells and other payloads in this location by exploiting CVE-2026-1219. Configure FIM or an EDR tool to generate high-priority alerts for any new file creation events within this directory, particularly for file types like .aspx, .ashx, .dll, and .exe. A newly created file in this directory that is not part of a legitimate, vendor-signed extension installation should be treated as a high-confidence indicator of compromise. Immediately quarantine the file and the server for forensic analysis.
ConnectWise releases ScreenConnect version 23.9.8 to patch CVE-2026-1014 and CVE-2026-1219.
CISA adds CVE-2026-1014 to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.