Home / Tech / ConnectWise Automate: AiTM Attack Bug Patched – Security Update

ConnectWise Automate: AiTM Attack Bug Patched – Security Update

ConnectWise Automate: AiTM Attack Bug Patched – Security Update

Critical⁤ Security Update issued ​for ConnectWise Automate: Protect‍ Your Systems Now

ConnectWise has released a security update for its Automate‌ remote monitoring and management (RMM) platform to address‍ two significant‌ vulnerabilities that could allow attackers to compromise your systems. These flaws, impacting both cloud and on-premise deployments, require immediate attention, particularly if you manage an on-premise installation.

Here’s a breakdown of the issues ‌and what you need to ‍do to protect your environment.

Understanding the vulnerabilities

The first vulnerability, identified as ⁢ CVE-2025-11492, centers around insecure communication channels. It allows a network-based attacker to perhaps intercept or modify traffic, including sensitive commands, credentials, and update‌ payloads. In on-premise environments, reliance on unencrypted HTTP or weak encryption could expose your⁤ Automate instance to‍ this risk.

The second vulnerability, CVE-2025-11493 (severity score of 8.8), involves a ⁤lack of integrity verification for update packages. This means updates, along with thier associated dependencies and integrations, aren’t⁤ properly checked for tampering.

Combining these two‌ vulnerabilities creates a hazardous scenario. ‍An attacker could impersonate a legitimate ConnectWise server ​and deliver malicious files⁢ – such as⁤ malware disguised as legitimate updates – directly to your systems.

What’s Been Done & What You need To​ Do

ConnectWise has already addressed these vulnerabilities ⁣for all cloud-based instances, updating them to the latest ​Automate release (2025.9).

Though, if you are running an on-premise deployment, you must ‌take action. ConnectWise recommends installing the new release as soon as possible – ideally within days. This is ​not ⁤a situation to ​delay.

While there’s currently no evidence of active exploitation, ​ConnectWise warns that these vulnerabilities pose a heightened risk of being targeted by attackers. ‌

Also Read:  Decathlon Active Desk: Boost Energy & Fitness at Work | Mini Cross Trainer Review

Why This Matters: A History of ConnectWise Security‍ Incidents

This isn’t the‌ first time ConnectWise products have been targeted. Previously, ⁢critical flaws in ScreenConnect were actively exploited. Earlier this year, a nation-state actor breached ConnectWise’s environment, impacting numerous ScreenConnect customers.

Following ⁣that breach, ConnectWise was forced to rotate all its digital code signing certificates to prevent misuse ⁤of‍ legitimate software. ‍ This history underscores the importance of proactively addressing security‍ vulnerabilities in ConnectWise products.

Key Takeaways & Recommendations

* Immediate action Required: if ⁢you use ConnectWise Automate on-premise, update to ​release 2025.9 immediately.
* Prioritize Updates: Regularly apply security updates to all your software, not just ConnectWise products.
* Network ‌security: Ensure your network is properly segmented and secured to limit the impact of potential breaches.
* Stay Informed: Monitor security advisories from connectwise ‍and ⁣other vendors to stay ahead of emerging threats.
* Consider Cloud Deployment: If feasible, migrating to a ​cloud-based deployment can offload ‍some of the ‍security burden to‍ the vendor.

Protecting your systems requires vigilance ‌and a proactive approach to security. don’t wait for an attack to happen -​ take action now‍ to mitigate these vulnerabilities and safeguard‍ your data.

Leave a Reply