Ad

CVE-2025-3935

HIGH CVSS 3.1: 7.2 EPSS 15.5%
Updated Oct 24, 2025
Connectwise
Parameter Value
CVSS 7.2 (HIGH)
Affected Versions before 25.2.4
Fixed In 25.2.4
Type CWE-502 (Deserialization of Untrusted Data)
Vendor Connectwise
Public PoC Yes

ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. It is important to note that to obtain these machine keys, privileged system level access must be obtained.

If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior. This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Connectwise Screenconnect
cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*
25.2.4

Related Vulnerabilities