According to the official ConnectWise Product and Services Status page, ScreenConnect is currently operational. While the service is not experiencing a widespread outage, it’s possible you may be experiencing issues due to:
Planned Maintenance:
- There are a couple of planned maintenance periods scheduled for the ConnectWise platform, including the Asio platform and the customer portal, on September 19 and September 20. While ScreenConnect is listed as operational, these related services could cause intermittent issues.
Localized Issues:
- An issue may be affecting a specific region, a small group of accounts, or a single host. These are often resolved quickly and may not be listed on the main status page.
On-Premise vs. Cloud:
- If you are using an on-premise installation of ScreenConnect, the issue may be with your local network, server, or configuration rather than the ConnectWise cloud service.
Your Internet Service Provider (ISP):
- Your own internet connection or a problem with your ISP could be causing connectivity problems.
What to Do
Check the Official Status Page:
- For the most accurate and real-time information, always bookmark and check the official status page: status.connectwise.com.
Contact Support:
- If the status page shows “operational” but you’re still experiencing problems, you may need to reach out to ConnectWise support. They can help you troubleshoot issues specific to your account or on-premise installation.
Also Read : philo.tv/Samsung
How can I check if my ScreenConnect instance is vulnerable
To check if your ScreenConnect instance is vulnerable, especially to critical security flaws like CVE-2024-1709 and CVE-2024-1708, you can follow these steps:
Identify Your ScreenConnect Version
Log in to your ScreenConnect admin portal.
Check the version number; all versions prior to 23.9.8 are vulnerable to these critical flaws.
Use Vulnerability Scanners
Use free online tools like the ScreenConnect Vulnerability Scanner available from security vendors to scan your public-facing ScreenConnect instance. These scanners test if your system is exploitable by known vulnerabilities.
Example tool: ScreenConnect Vulnerability Scanner for CVE-2024-1709 and CVE-2024-1708 scans ports 80, 443, and 8040 commonly used by ScreenConnect.
Check for Unauthorized Access or Altered Accounts
Look for suspicious admin user accounts created unexpectedly, as attackers could exploit vulnerabilities to create admin-level access without authentication.
Review audit logs and user access history.
Run Security and Vulnerability Scans Internally
Use internal enterprise vulnerability assessment tools like Ordr or Rapid7, which can map installed software versions and detect exposed vulnerabilities.
Patch Immediately If Vulnerable
If your ScreenConnect version is older than 23.9.8 or unpatched, download and apply the latest security patches immediately from ConnectWise Trust Center.
Monitor for Signs of Compromise
Unusual network traffic, unknown user accounts, or webshell presence on your instance might indicate exploitation.
Change Passwords and Enable MFA
After patching, reset all admin passwords and enable multi-factor authentication to secure access.
Follow Official Security Advisories
Regularly check ConnectWise Security Advisories and Trust Center for updates and mitigation steps.
These steps help ensure your ScreenConnect instance is not exposed to critical vulnerabilities and reduces the risk of unauthorized access or attack.
Be the first to comment