Date: March 19, 2026
Severity: High
Affected Product: ConnectWise ScreenConnect (versions prior to 26.1)
Executive Summary
Critical Path Security is advising clients of a recently disclosed security concern impacting ConnectWise ScreenConnect related to the potential abuse of ASP.NET machine key material used for authentication trust.
If cryptographic material associated with a ScreenConnect instance is exposed, a threat actor may be able to forge or manipulate trusted application data. This could result in unauthorized access, session hijacking, and privilege escalation within the platform.
ConnectWise has released version 26.1 to address this risk through enhanced protection and rotation of cryptographic material.
Immediate action is recommended.
Technical Overview
ScreenConnect relies on ASP.NET machine keys to sign and validate protected application data, including authentication tokens and session state.
Under normal conditions, these keys ensure:
-
Data integrity
-
Authenticity of session information
-
Protection against tampering
However, if machine key material becomes accessible through:
-
Misconfigured backups
-
Exposed configuration files
-
Compromised systems
-
Unauthorized administrative access
An attacker may be able to:
-
Generate valid authentication tokens
-
Modify protected session data
-
Bypass authentication controls
-
Execute actions as a trusted or privileged user
This effectively undermines the trust model of the application.
Risk Impact
Successful exploitation may allow:
-
Unauthorized access to ScreenConnect instances
-
Hijacking of active remote sessions
-
Privilege escalation within the platform
-
Unauthorized administrative actions
-
Potential downstream compromise of managed endpoints
Given ScreenConnect’s role in remote access and management, this risk extends beyond the application itself and into the broader enterprise environment.
Observed Activity
Security researchers have reported active attempts to abuse disclosed ASP.NET machine key material in the wild.
While this advisory is focused on hardening and risk reduction, the presence of exploitation attempts indicates that threat actors are aware of and pursuing this attack path.
Vendor Response
ConnectWise has implemented the following security improvements in ScreenConnect version 26.1:
-
Enhanced protection of instance-specific cryptographic material
-
Ability to regenerate machine key material on demand
-
Improved integrity controls around authentication mechanisms
These changes reduce both the likelihood and duration of potential abuse if key material is exposed.
Recommended Actions
Critical Path Security recommends the following immediate steps:
1. Update Immediately
-
Upgrade all ScreenConnect instances to version 26.1 or later
2. Rotate Cryptographic Material
-
Regenerate machine keys where possible, especially if exposure is suspected
3. Restrict Access to Sensitive Data
-
Limit access to:
-
Application configuration files
-
Backup archives
-
System snapshots
-
4. Review Access Controls
-
Validate least privilege access at both:
-
Application level
-
Server level
-
5. Monitor for Suspicious Activity
-
Review logs for:
-
Unusual authentication events
-
Unexpected administrative actions
-
Session anomalies
-
6. Secure Backups and Artifacts
-
Ensure backups and exported configurations are:
-
Encrypted
-
Stored securely
-
Not accessible to unauthorized users
-
7. Validate Extensions
-
Confirm all ScreenConnect extensions are:
-
Trusted
-
Up to date
-
Actively maintained
-
Detection and Monitoring Considerations
Organizations should prioritize detection of:
-
Abnormal session creation or reuse
-
Authentication events without corresponding login activity
-
Privileged actions originating from unexpected sources
-
Changes to configuration or authentication settings
Integration with SIEM and centralized logging is strongly recommended.
Conclusion
This issue highlights a critical reality in modern application security:
When cryptographic trust is compromised, traditional authentication controls become unreliable.
For platforms like ScreenConnect, which sit at the center of remote access and administrative control, the impact is amplified significantly.
Organizations should treat this advisory as a priority and take immediate steps to update, secure, and monitor their environments.
References
-
Canadian Centre for Cyber Security Advisory AV26-257
-
ConnectWise ScreenConnect Security Bulletin (March 17, 2026)
