www.connectwise.com
Open in
urlscan Pro
2606:4700:4400::6812:2188
Public Scan
URL:
https://www.connectwise.com/company/trust/advisories
Submission: On June 04 via api from TR — Scanned from DE
Submission: On June 04 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOM<form class="mktoForm mktoHasWidth mktoLayoutLeft" data-form-id="1301" data-poi="" data-page-source="" data-campaign-code="" data-gclid="" data-zoom-info="" __bizdiag="-483733644" __biza="WJ__" id="mktoForm_1301" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoFieldWrap mktoRequiredField"><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true"
style="width: 150px;" placeholder="Business Email Address"></div>
</div>
</div>
<div class="mktoFormRow mktoFormRowHidden">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoFieldWrap mktoRequiredField"><select id="Country" name="Country" aria-labelledby="LblCountry InstructCountry" class="mktoField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;">
<option value="">Country</option>
<option value="AF">Afghanistan</option>
<option value="AL">Albania</option>
<option value="DZ">Algeria</option>
<option value="AX">Aland Islands</option>
<option value="AS">American Samoa</option>
<option value="AI">Anguilla</option>
<option value="AD">Andorra</option>
<option value="AO">Angola</option>
<option value="AN">Antilles - Netherlands</option>
<option value="AG">Antigua and Barbuda</option>
<option value="AQ">Antarctica</option>
<option value="AR">Argentina</option>
<option value="AM">Armenia</option>
<option value="AU">Australia</option>
<option value="AT">Austria</option>
<option value="AW">Aruba</option>
<option value="AZ">Azerbaijan</option>
<option value="BA">Bosnia and Herzegovina</option>
<option value="BB">Barbados</option>
<option value="BD">Bangladesh</option>
<option value="BE">Belgium</option>
<option value="BF">Burkina Faso</option>
<option value="BG">Bulgaria</option>
<option value="BH">Bahrain</option>
<option value="BI">Burundi</option>
<option value="BJ">Benin</option>
<option value="BM">Bermuda</option>
<option value="BN">Brunei Darussalam</option>
<option value="BO">Bolivia</option>
<option value="BR">Brazil</option>
<option value="BS">Bahamas</option>
<option value="BT">Bhutan</option>
<option value="BV">Bouvet Island</option>
<option value="BW">Botswana</option>
<option value="BV">Belarus</option>
<option value="BZ">Belize</option>
<option value="KH">Cambodia</option>
<option value="CM">Cameroon</option>
<option value="CA">Canada</option>
<option value="CV">Cape Verde</option>
<option value="CF">Central African Republic</option>
<option value="TD">Chad</option>
<option value="CL">Chile</option>
<option value="CN">China</option>
<option value="CX">Christmas Island</option>
<option value="CC">Cocos Islands</option>
<option value="CO">Colombia</option>
<option value="CG">Congo</option>
<option value="CI">Ivory Coast</option>
<option value="CK">Cook Islands</option>
<option value="CR">Costa Rica</option>
<option value="HR">Croatia</option>
<option value="CY">Cyprus</option>
<option value="CZ">Czech Republic</option>
<option value="CD">Democratic Republic of the Congo</option>
<option value="DJ">Djibouti</option>
<option value="DK">Denmark</option>
<option value="DM">Dominica</option>
<option value="DO">Dominican Republic</option>
<option value="EC">Ecuador</option>
<option value="EG">Egypt</option>
<option value="SV">El Salvador</option>
<option value="TP">East Timor</option>
<option value="EE">Estonia</option>
<option value="GQ">Equatorial Guinea</option>
<option value="ER">Eritrea</option>
<option value="ET">Ethiopia</option>
<option value="FI">Finland</option>
<option value="FJ">Fiji</option>
<option value="FK">Falkland Islands</option>
<option value="FM">Federated States of Micronesia</option>
<option value="FO">Faroe Islands</option>
<option value="FR">France</option>
<option value="GF">French Guiana</option>
<option value="PF">French Polynesia</option>
<option value="GA">Gabon</option>
<option value="GM">Gambia</option>
<option value="DE">Germany</option>
<option value="GH">Ghana</option>
<option value="GI">Gibraltar</option>
<option value="GB">Great Britain</option>
<option value="GD">Grenada</option>
<option value="GE">Georgia</option>
<option value="GR">Greece</option>
<option value="GL">Greenland</option>
<option value="GN">Guinea</option>
<option value="GP">Guadeloupe</option>
<option value="GS">S. Georgia and S. Sandwich Islands</option>
<option value="GT">Guatemala</option>
<option value="GU">Guam</option>
<option value="GW">Guinea-Bissau</option>
<option value="GY">Guyana</option>
<option value="HK">Hong Kong</option>
<option value="HM">Heard Island and McDonald Islands</option>
<option value="HN">Honduras</option>
<option value="HT">Haiti</option>
<option value="HU">Hungary</option>
<option value="ID">Indonesia</option>
<option value="IE">Ireland</option>
<option value="IL">Israel</option>
<option value="IN">India</option>
<option value="IO">British Indian Ocean Territory</option>
<option value="IQ">Iraq</option>
<option value="IT">Italy</option>
<option value="JM">Jamaica</option>
<option value="JO">Jordan</option>
<option value="JP">Japan</option>
<option value="KE">Kenya</option>
<option value="KG">Kyrgyzstan</option>
<option value="KI">Kiribati</option>
<option value="KM">Comoros</option>
<option value="KN">Saint Kitts and Nevis</option>
<option value="KR">Korea South</option>
<option value="KW">Kuwait</option>
<option value="KY">Cayman Islands</option>
<option value="KZ">Kazakhstan</option>
<option value="LA">Laos</option>
<option value="LB">Lebanon</option>
<option value="LC">Saint Lucia</option>
<option value="LI">Liechtenstein</option>
<option value="LK">Sri Lanka</option>
<option value="LR">Liberia</option>
<option value="LS">Lesotho</option>
<option value="LT">Lithuania</option>
<option value="LU">Luxembourg</option>
<option value="LV">Latvia</option>
<option value="LY">Libya</option>
<option value="MK">Macedonia</option>
<option value="MO">Macao</option>
<option value="MG">Madagascar</option>
<option value="MY">Malaysia</option>
<option value="ML">Mali</option>
<option value="MW">Malawi</option>
<option value="MR">Mauritania</option>
<option value="MH">Marshall Islands</option>
<option value="MQ">Martinique</option>
<option value="MU">Mauritius</option>
<option value="YT">Mayotte</option>
<option value="MT">Malta</option>
<option value="MX">Mexico</option>
<option value="MA">Morocco</option>
<option value="MC">Monaco</option>
<option value="MD">Moldova</option>
<option value="MN">Mongolia</option>
<option value="MM">Myanmar</option>
<option value="MP">Northern Mariana Islands</option>
<option value="MS">Montserrat</option>
<option value="MV">Maldives</option>
<option value="MZ">Mozambique</option>
<option value="NA">Namibia</option>
<option value="NC">New Caledonia</option>
<option value="NE">Niger</option>
<option value="NF">Norfolk Island</option>
<option value="NG">Nigeria</option>
<option value="NI">Nicaragua</option>
<option value="NL">Netherlands</option>
<option value="NO">Norway</option>
<option value="NP">Nepal</option>
<option value="NR">Nauru</option>
<option value="NU">Niue</option>
<option value="NZ">New Zealand</option>
<option value="OM">Oman</option>
<option value="PA">Panama</option>
<option value="PE">Peru</option>
<option value="PG">Papua New Guinea</option>
<option value="PH">Philippines</option>
<option value="PK">Pakistan</option>
<option value="PL">Poland</option>
<option value="PM">Saint Pierre and Miquelon</option>
<option value="CS">Serbia and Montenegro</option>
<option value="PN">Pitcairn</option>
<option value="PR">Puerto Rico</option>
<option value="PS">Palestinian Territory</option>
<option value="PT">Portugal</option>
<option value="PW">Palau</option>
<option value="PY">Paraguay</option>
<option value="QA">Qatar</option>
<option value="RE">Reunion</option>
<option value="RO">Romania</option>
<option value="RU">Russian Federation</option>
<option value="RW">Rwanda</option>
<option value="SA">Saudi Arabia</option>
<option value="WS">Samoa</option>
<option value="SH">Saint Helena</option>
<option value="VC">Saint Vincent and the Grenadines</option>
<option value="SM">San Marino</option>
<option value="ST">Sao Tome and Principe</option>
<option value="SN">Senegal</option>
<option value="SC">Seychelles</option>
<option value="SL">Sierra Leone</option>
<option value="SG">Singapore</option>
<option value="SK">Slovakia</option>
<option value="SI">Slovenia</option>
<option value="SB">Solomon Islands</option>
<option value="SO">Somalia</option>
<option value="ZA">South Africa</option>
<option value="ES">Spain</option>
<option value="SD">Sudan</option>
<option value="SR">Suriname</option>
<option value="SJ">Svalbard and Jan Mayen</option>
<option value="SE">Sweden</option>
<option value="CH">Switzerland</option>
<option value="SZ">Swaziland</option>
<option value="TW">Taiwan</option>
<option value="TZ">Tanzania</option>
<option value="TJ">Tajikistan</option>
<option value="TH">Thailand</option>
<option value="TL">Timor-Leste</option>
<option value="TG">Togo</option>
<option value="TK">Tokelau</option>
<option value="TO">Tonga</option>
<option value="TT">Trinidad and Tobago</option>
<option value="TN">Tunisia</option>
<option value="TR">Turkey</option>
<option value="TM">Turkmenistan</option>
<option value="TC">Turks and Caicos Islands</option>
<option value="TV">Tuvalu</option>
<option value="UA">Ukraine</option>
<option value="UG">Uganda</option>
<option value="AE">United Arab Emirates</option>
<option value="UK">United Kingdom</option>
<option value="US">United States</option>
<option value="UM">United States Minor Outlying Islands</option>
<option value="UY">Uruguay</option>
<option value="UZ">Uzbekistan</option>
<option value="VU">Vanuatu</option>
<option value="VA">Vatican City State</option>
<option value="VE">Venezuela</option>
<option value="VG">Virgin Islands</option>
<option value="VI">Virgin Islands</option>
<option value="VN">Viet Nam</option>
<option value="WF">Wallis and Futuna</option>
<option value="EH">Western Sahara</option>
<option value="YE">Yemen</option>
<option value="ZM">Zambia</option>
<option value="ZW">Zimbabwe</option>
</select></div>
</div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1301"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="417-HWY-826">
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="Jigsaw" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="mKTOProductInterest" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="pageSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="campaignCodeMostRecent" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="utmcontent" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="utmmedium" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="utmsource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="utmterm" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="referringURL" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="CWS_GCLID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
<div class="mktoFormRow mktoFormRowHidden"><input type="hidden" name="ga_cid__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;"></div>
</form>
<form class="mktoForm mktoHasWidth mktoLayoutLeft" data-form-id="1301" data-poi="" data-page-source="" data-campaign-code="" data-gclid="" data-zoom-info="" __bizdiag="-483733644" __biza="WJ__" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
___ Trust Center Contact Us Sign In Close Search Modal Close Search Bar Search * Products & Services * Community & Resources * Why ConnectWise * Support Close Search Modal Close Search Bar Search Try For Free PRODUCTS & SERVICES * Business Management Integrated front and back office solutions * Unified Monitoring and Management Manage customer endpoints and data * Cybersecurity and Data Protection Protect your clients’ critical business assets * Asio—The MSP Platform The purpose-built platform for MSPs Explore Solution Marketplace Third-party integrations to enhance our products BUSINESS MANAGEMENT INTEGRATED FRONT AND BACK OFFICE SOLUTIONS Explore Business Management PSA Professional services automation designed to run your as-a-service business CPQ Advanced quote and proposal automation to streamline your quoting BrightGauge KPI dashboards and reporting for real-time business insights ITBoost Centralized, intuitive IT documentation Service Leadership Increase shareholder value and profitability SmileBack Customer service feedback for MSPs Business Management Packages Optimize your business operations through curated packages designed to streamline, standardize, and automate your business processes Explore Business Management PSA Professional services automation designed to run your as-a-service business CPQ Advanced quote and proposal automation to streamline your quoting BrightGauge KPI dashboards and reporting for real-time business insights ITBoost Centralized, intuitive IT documentation Service Leadership Increase shareholder value and profitability SmileBack Customer service feedback for MSPs Business Management Packages Optimize your business operations through curated packages designed to streamline, standardize, and automate your business processes Explore Business Management See our latest product innovations that enhance your ConnectWise experience. View roadmap>> UNIFIED MONITORING AND MANAGEMENT MANAGE CUSTOMER ENDPOINTS AND DATA Explore Unified Monitoring and Management RMM Monitor and manage your client's networks the way you want - hands on, automated or both with our NOC services Automate Powerful RMM for next-level IT support ScreenConnect™ Remotely access and support any device, anywhere, any time Explore Unified Monitoring and Management RMM Monitor and manage your client's networks the way you want - hands on, automated or both with our NOC services Automate Powerful RMM for next-level IT support ScreenConnect™ Remotely access and support any device, anywhere, any time Explore Unified Monitoring and Management See our latest product innovations that enhance your ConnectWise experience. View roadmap>> CYBERSECURITY AND DATA PROTECTION PROTECT YOUR CLIENTS’ CRITICAL BUSINESS ASSETS Explore Cybersecurity MDR Monitor & stop malicious activity on endpoints SIEM Centralize threat visibility and analysis Risk and Vulnerability Management Identify cybersecurity risks and routinely scan for vulnerabilities Access Management Eliminate shared admin passwords and protect customers SASE Apply zero trust secure access for users, locations, and devices Explore Cybersecurity MDR Monitor & stop malicious activity on endpoints SIEM Centralize threat visibility and analysis Risk and Vulnerability Management Identify cybersecurity risks and routinely scan for vulnerabilities Access Management Eliminate shared admin passwords and protect customers SASE Apply zero trust secure access for users, locations, and devices Explore Data Protection SaaS Backup Safeguard customer cloud app data Co-Managed Backup Streamline third-party backup management Incident Response Services Quickly access cybersecurity experts for critical security incidents Explore Data Protection SaaS Backup Safeguard customer cloud app data Co-Managed Backup Streamline third-party backup management Incident Response Services Quickly access cybersecurity experts for critical security incidents Explore Cybersecurity and Data Protection See our latest product innovations that enhance your ConnectWise experience. View roadmap>> ASIO—THE MSP PLATFORM THE PURPOSE-BUILT PLATFORM FOR MSPS Explore Platform Asio The purpose-built platform for MSPs Product Roadmap Product innovations and updates Platform Capabilities Understand the technology Platform Benefits The path to hyperautomation Explore Platform Asio The purpose-built platform for MSPs Product Roadmap Product innovations and updates Platform Capabilities Understand the technology Platform Benefits The path to hyperautomation Hyperautomation Solutions RPA Eliminate manual steps with easy to use workflows Sidekick Generative AI for team productivity Hyperautomation Solutions RPA Eliminate manual steps with easy to use workflows Sidekick Generative AI for team productivity See our latest product innovations that enhance your ConnectWise experience. View roadmap>> COMMUNITY & RESOURCES * Community & Events Industry events and networking * Open Ecosystem Top-rated vendors and integrations * Resources Business-driving insights and guidance COMMUNITY & EVENTS INDUSTRY EVENTS AND NETWORKING IT Nation IT Nation Connect Premier MSP industry conference IT Nation Secure MSP cybersecruity industry conference IT Nation Evolve Coaching & peer groups Wise Up Podcast Insights and strategies to help your business IT Nation London Regional MSP industry conference IT Nation Sydney Regional MSP industry conference IT Nation IT Nation Connect Premier MSP industry conference IT Nation Secure MSP cybersecruity industry conference IT Nation Evolve Coaching & peer groups Wise Up Podcast Insights and strategies to help your business IT Nation London Regional MSP industry conference IT Nation Sydney Regional MSP industry conference ConnectWise Automation Nation AI & hyperautomation training User Groups ConnectWise product training Innovation Webinars The latest ConnectWise product innovations Virtual Community Find help from peer connections ConnectWise Automation Nation AI & hyperautomation training User Groups ConnectWise product training Innovation Webinars The latest ConnectWise product innovations Virtual Community Find help from peer connections Explore The IT Nation See our latest product innovations that enhance your ConnectWise experience. View roadmap>> OPEN ECOSYSTEM TOP-RATED VENDORS AND INTEGRATIONS Open Ecosystem Marketplace Vendors and integrations The Invent Program Third-party integration certification Open Ecosystem Marketplace Vendors and integrations The Invent Program Third-party integration certification Partnerships Microsoft SentinelOne Bitdefender Axcient Acronis Partnerships Microsoft SentinelOne Bitdefender Axcient Acronis See our latest product innovations that enhance your ConnectWise experience. View roadmap>> RESOURCES BUSINESS-DRIVING INSIGHTS AND GUIDANCE Partner Resources Webinars Blog eBooks Case studies Industry reports Feature sheets On-demand demos Product Roadmap Product innovations and updates Partner Resources Webinars Blog eBooks Case studies Industry reports Feature sheets On-demand demos Product Roadmap Product innovations and updates Explore all resources See our latest product innovations that enhance your ConnectWise experience. View roadmap>> WHY CONNECTWISE About Us About ConnectWise Mission & Vision History Leadership Board of Directors Careers Partner Program Philanthropy Partner Referral Company Updates Press Room Awards Case studies Asio—The MSP Platform The only truly unified platform purpose-built for MSPs. Learn more >> SUPPORT * Partner Support ConnectWise solution resources * Partner Education Certifications and resources PARTNER SUPPORT CONNECTWISE SOLUTION RESOURCES Get Support ConnectWise Home Solution access and product news Documentation Product info and manuals Virtual Community Partner peer connections Lookup My Account Team Account support and management Get Support ConnectWise Home Solution access and product news Documentation Product info and manuals Virtual Community Partner peer connections Lookup My Account Team Account support and management Partner Support Access your products, see announcements, and find support Log in to ConnectWise Home >> PARTNER EDUCATION CERTIFICATIONS AND RESOURCES Explore Partner Education ConnectWise Certify™ Industry training and certifications University Partner tools, resources, courses Modes Theory™ Business growth framework Explore Partner Education ConnectWise Certify™ Industry training and certifications University Partner tools, resources, courses Modes Theory™ Business growth framework Service Leadership, Inc. Discover total profit solutions for IT companies. Learn more >> Cybersecurity Center Industry leading tools, advice, and community Platform * Asio™ Platform * What's New * Cybersecurity Management * Unified Management * Business Management * Integrated Expert Services Resources * Trust Center * Security Bulletins * Advisories * Glossary * All Cyber Resources Partner Program Risk Assessment Demos & Trials MENU Demos & Trials * Platform * Asio™ Platform * What's New * Cybersecurity Management * Unified Management * Business Management * Integrated Expert Services * Resources * Trust Center * Security Bulletins * Advisories * Glossary * All Cyber Resources * Partner Program * Risk Assessment 1. Home 2. Company 3. Trust Center 4. Advisories LATEST ADVISORIES From time to time, ConnectWise will provide communications on broader security related topics that may not be linked to a specific ConnectWise product or vulnerability, but are still of importance to our partner community. ACTIVE ADVISORY * Unauthenticated access to legacy AWS server located in the EU region * ScreenConnect vulnerability CWE-288 * ScreenConnect 23.9.8 security bulletin * How to upgrade on-premise installation * Remediation + Hardening Guide (pdf) * Download patch * FAQ HELPFUL LINKS * Advisories RSS feed link * Chrome RSS feed extension * Visit our Trust Center * See latest security bulletins * Check status.connectwise.com * Call 1-888-WISE911 to report a security vulnerability * Email help@connectwise.com * Login and open a ticket on ConnectWise Home * Update/check my email preferences AWS-EU-0321 MARCH 21, 2024 UNAUTHENTICATED ACCESS TO LEGACY AWS SERVER LOCATED IN THE EU REGION We want to notify you of a security incident that we are currently investigating. Our team was notified by a security researcher of a vulnerability to a single AWS server in our EU environment. This server hosts a legacy service that we had targeted for deprecation. While our investigation is ongoing, we wanted to inform you of the potential risk associated with this incident. INCIDENT DETAILS Date and time: The vulnerability was initially reported on March 17. On March 18, we mitigated the vulnerability and subsequently, on March 20, we discovered there was unauthorized access to the AWS server. Nature of access: The access appears to be unauthenticated, indicating a potential security breach. Server location: The compromised single server is a legacy system in the AWS EU region. Data at risk: Preliminary investigations suggest that the information viewable to an unauthorized party would be limited to the email addresses for a subset of individuals who had authenticated into the EU environment. ACTIONS TAKEN Immediate response: Upon detection, our security team initiated immediate response protocols to contain the incident and mitigate any further potential risks. Investigation: Our InfoSec team, working alongside an external forensics firm, have launched a thorough investigation into the incident to ascertain the extent of the unauthorized access and any potential malicious activity. POTENTIAL IMPACT We are treating this incident seriously and are thoroughly investigating with our InfoSec team as well as an independent external forensics firm. We believe that there was a finite amount of information available to be viewed by an unauthorized party (e.g., email address) and that an unauthorized party would not be able to expand access beyond the single AWS server. The service in question is consumed by our legacy Continuum environments, however this issue is constrained to our EU implementation only. This service is not consumed by any of the other product lines such as PSA or Automate. Throughout the day on March 21, the teams are running additional scans and tests and partners may experience some intermittent slowness or authentication issues during those times. We will do our best to limit the partner impact. NEXT STEPS We will continue to share updates on the progress of our investigation and communicate directly to the small number of partners in the EU who may have been impacted. SUPPORT If you need any assistance or have additional questions, please go online to ConnectWise Home and open a case with our support team or email help@connectwise.com. We appreciate your continued partnership. MARCH 4, 2024 IMPORTANT UPDATE: HARDENING GUIDELINES FOR CONNECTWISE SCREENCONNECT CVE-2024-1708 (PATH TRAVERSAL) ConnectWise published a security bulletin and multiple communications regarding vulnerabilities found in ConnectWise ScreenConnect™ (CVE-2024-1709, CVE-2024-1708). As a reminder and as part of the remediation process for on-prem partners—whether you have patched your server or still need to—it is critical to assess your systems for signs of impact while upgrading and before bringing any systems back online. If you possess enhanced Windows event logs or endpoint detection and response (EDR) solutions, thorough investigation should be conducted to identify any suspicious activity, including evidence of commands run from webshells or other indicators of compromise. In the event of file anomalies or other indicators of compromise are identified, it is highly recommended to seek assistance from external response companies specializing in incident response and digital forensics. These companies possess the expertise necessary to effectively investigate and remediate security concerns. Cloud partners Cloud partners are remediated against both vulnerabilities reported on February 19. No further action is required from any cloud partner (“screenconnect.com” cloud and “hostedrmm.com”). On-premise partners Whether you have patched your server or still need to, it is critical to assess your systems for signs of impact while upgrading and before bringing any systems back online. Review file system, enhanced Windows event logs or EDR solutions for suspicious activity, such as webshell commands or other compromise indicators. Seek assistance from specialized incident response and forensics firms if potential impacted files are identified. To assist in the remediation and hardening process, we encourage partners to review and follow the ConnectWise ScreenConnect Remediation and Hardening Guide by Mandiant for additional protection. Within the Mandiant-provided hardening guide, you will find additional mitigation and steps to check for signs of compromise, such as: * Auditing rogue users, malicious extensions, and additional checks for indicators of compromise * Enabling baseline audit and privacy logs * Proxy server and load balance configurations * Restricting Egress * Additional details for restricting permissions These steps should be reviewed and implemented after you have upgraded to a patched version of ScreenConnect. We strongly urge all users of ScreenConnect to prioritize the installation of the latest patch and follow the recommended mitigation and hardening measures outlined in the provided resources to safeguard their systems against potential security risks. CWE-288 FEBRUARY 21, 2024 CONNECTWISE SCREENCONNECT VULNERABILITY CWE-288: WHAT SHOULD I DO? February 29, 2024 update: Cloud partner summary: Cloud partners are remediated against both vulnerabilities reported on February 19. No further action is required from any cloud partner (“screenconnect.com” cloud and “hostedrmm.com”). On-prem partner summary: On-prem partners are advised to immediately upgrade to the latest version of ScreenConnect to remediate against reported vulnerabilities. Active maintenance If you are on active maintenance, we strongly recommend upgrading to the most current release of 23.9.8 or later. Using the most current release of ScreenConnect includes security updates, bug fixes, and enhancements not found in older releases. Off maintenance ConnectWise has provided a patched version of 22.4.20001 available to any partner regardless of maintenance status as an interim step to mitigate the vulnerability. If you are not currently under maintenance, please upgrade your servers to version 22.4.20001 at minimum or to your latest eligible patched version that includes the remediation for CVE-2024-1709. Upgrade ScreenConnect to a patched version immediately 1. To upgrade to version 23.9.8 or later, please note there is a specific upgrade path that must be followed: 2.1 → 2.5 → 3.1 → 4.4 → 5.4 → 19.2 → 22.8 → 23.3 → 23.9.8+ 2. If you are not on maintenance and upgrading to 22.4.20001 (or your latest eligible version), please follow this specified upgrade path: 2.1 → 2.5 → 3.1 → 4.4 → 5.4 → 19.2 → 22.4.20001 For instructions on how to upgrade your on-premise installation click here. Addressing license errors If a license error arises during the upgrade, please stop the four ScreenConnect services (Session Manager, Security Manager, Web Server, Relay), move the “License.xml” file from the installation folder “C:\Program Files (x86)\ScreenConnect\App_Data\License.xml” to another location such as Desktop, and proceed with the upgrade. After the upgrade is complete, the license key will need to be re-added by stopping the four services and dropping the file back into the App_Data folder. February 21 original advisory: If you suspect you have been compromised related to the recent ConnectWise ScreenConnect™ vulnerability (CWE-288), please follow the mitigation steps below. 1. Upgrade ScreenConnect to the current 23.9.8 version immediately * Please note, there is an upgrade path that must be followed* 2.1 → 2.5 → 3.1 → 4.4 → 5.4 →19.2→22.8→23.3→ 23.9 * Click here to upgrade your on-premise installation 2. If you receive a license error when upgrading, it may be due to a technical problem on the server, or the license key itself may need to be renewed*. If the upgrade cannot be completed, please delete the SetupWizard.aspx file out of the installation folder: C:\Program Files (x86)\ScreenConnect\SetupWizard.aspx *Please see the February 29, 2024 advisory update to review the amended upgrade path and instructions on how to address licensing errors. 3. Identify the issue * When compromised, the User.xml file on the ScreenConnect instance is reset and replaced with a new file that contains only information about one new user C:\Program Files (x86)\ScreenConnect\App_Data\User.xml * This file can be restored from a backup to get the original users back (if applicable) * If you don’t have a user backup, the user file can be reset again by following the process outlined here. 4. Once you are able to log in, check for malicious commands/tools or connections. * Install the Report Manager extension on the Admin > Extensions page > Browse Extension Marketplace button * Launch Report Manager from the Admin page > Extras menu (4x boxes lower left corner) > Report Manager * There are pre-built reports that will export data as a CSV. All reports show the last 30 days of data by default (this is dependent on the database maintenance plans) * Host Session Connections—shows all connections made to devices * Queued Commands Example—shows all remote commands run against devices * Queued Toolbox Items Example—shows all toolbox items that were queued up Support If you need any assistance or have additional questions, please go online to ConnectWise Home and open a case with our support team or email help@connectwise.com. Report a security incident If you have questions or need to report a security or privacy incident, please visit our ConnectWise Trust Center. You can also call our Partner InfoSec Hotline at 1-888-WISE911 to report a non-active security incident or a security vulnerability. FEBRUARY 20, 2024 PATCH IMMEDIATELY—CRITICAL SCREENCONNECT VULNERABILITY Update: Indicators of compromise Indicators of compromise (IOCs) look for malicious activity or threats. These indicators can be incorporated into your cybersecurity monitoring platform. They can help you stop a cyberattack that's in progress. Plus, you can use IOCs to find ways to detect and stop ransomware, malware, and other cyberthreats before they cause data breaches. We received updates of compromised accounts that our incident response team have been able to investigate and confirm. The following IP addresses were recently used by threat actors that we are making available for protection and defense. IOCs: * 155.133.5.15 * 155.133.5.14 * 118.69.65.60 We will continue to update with any further information as it becomes available. Original Advisory: Summary At ConnectWise, our top priority is upholding our commitment to deliver and maintain secure products for our partners. Our team has been working around the clock to ensure your protection from the issues affecting the latest ConnectWise ScreenConnect™ vulnerability that was responsibly reported to us through our vulnerability disclosure process. Product(s) impacted ConnectWise ScreenConnect™, including ScreenConnect instances co-hosted on ConnectWise Automate™ cloud servers. What we know Vulnerabilities were reported February 13, 2024, through our vulnerability disclosure channel via the ConnectWise Trust Center. There is no evidence that these vulnerabilities have been exploited in the wild, but immediate action must be taken by on-premise partners to address these identified security risks. Our response We have been following our escalated vulnerability response process, and because of the teams working tirelessly, a patch was made available on February 19, 2024. Remediation It is strongly recommended that our on-premise partners not wait for a maintenance window to patch but immediately update the latest ScreenConnect version 23.9.8. More information on this vulnerability and detailed instructions on patch availability and how to mitigate the vulnerabilities can be found in this security bulletin. Report a security incident If you have additional security-related questions, please contact security@connectwise.com. To report a security or privacy incident, please visit the ConnectWise Trust Center. You can report both a non-active security incident, report a security vulnerability, or call our Partner InfoSec Hotline at 1-888-WISE911. FEBRUARY 9, 2024 FORTISIEM CRITICAL VULNERABILITIES AFFECTING CONNECTWISE CO-MANAGED SIEM POWERED BY STRATOZEN Fortinet has recently released two critical vulnerabilities in its FortiSIEM platform (CVE-2024-23108 and CVE-2024-23109), which is used as part of the ConnectWise Co-Managed SIEM powered by StratoZen security offering. Fortinet is advising all partners to upgrade to the latest version of FortiSIEM (7.1.3), which Fortinet just released. Please note that all hosted StratoZen environments are protected by firewalls that do not allow traffic to the FortiSIEM instances on the vulnerable service. Nevertheless, out of an abundance of caution, ConnectWise is upgrading all hosted environments over the next week, and we strongly recommend all co-managed partners upgrade to the latest version of FortiSIEM. What we know The vulnerability is within an API used for communications between FortiSIEM components. Collectors do not communicate on that API and are not impacted by the CVE-2024-23108 and CVE-2024-23109 vulnerabilities. ConnectWise does not allow access to the environments on that API, thus the vulnerability cannot be directly exploited remotely. Our response All hosted FortiSIEM instances are running behind our firewall that is not exposing the vulnerable port and service, protecting your instance. In addition, ConnectWise is upgrading all hosted FortiSIEM instances to the latest version of 7.1.3 over the next week. Remediation Hosted-StratoZen partners – All FortiSIEM instances are running behind our firewall that is not exposing the vulnerable port and service. No further immediate action is needed for hosted environments. Co-managed StratoZen partners – If you are a co-managed partner, we advise you take action immediately to upgrade your FortiSIEM instances to the latest version (7.1.3). We also encourage you to check your firewall settings to ensure only necessary ports are open for remote access. Please contact us at supportdesk@stratozen.com if you need any assistance with upgrading. Report a security incident If you have additional security-related questions, please contact security@connectwise.com. To report a security or privacy incident, please visit the ConnectWise Trust Center. You can report both a non-active security incident, report a security vulnerability, or call our Partner InfoSec Hotline at 1-888-WISE911. JANUARY 22, 2024 BRUTE-FORCE ATTEMPTS ON CONNECTWISE SCREENCONNECT What we know Our team recently noticed malicious activity by bad actors attempting credential-stuffing and brute-force attacks targeting some ConnectWise Automate partners with ConnectWise ScreenConnect instances. We are pleased to report that there is no evidence of any unauthorized access, and the security measures we have in place worked as intended to prevent any breach. What should you do? If you receive an email notifying you that you or someone in your company have been locked out of your ScreenConnect account, please make sure you do not click on any suspicious links and reach out to our support team immediately for assistance in verifying the legitimacy of the lockout email and restoring access securely. To contact support, go online to ConnectWise Home and log in to open a support ticket. Preventative security measures With the evolving sophistication of cyberattack attempts on the rise globally, we are keenly aware that this can happen anytime with any product to any company, large or small. So, it is critically important to maintain a security-first focus, remain vigilant, and follow best practices to ensure the ongoing safety and security of your information and systems. * Multi-factor authentication (MFA) Implement MFA to add an extra layer of protection. This significantly reduces the risk of unauthorized access, even if login credentials are compromised. You can find additional resources here and here to learn more about enabling MFA on your account. * Regular password policy reviews Enforce strong password policies for all users. Regularly review and update passwords to ensure they meet current security standards. To edit user password requirements and configurations, click here. * Employee training and awareness Conduct regular security awareness training for your team to recognize phishing attempts and other social engineering tactics. Employees play a crucial role in maintaining a secure environment. * Incident response plan Develop and regularly update an incident response plan. This ensures a swift and coordinated response in the event of a security incident, minimizing potential damage. By following these best practices and promptly contacting our support team when needed, we can collectively strengthen our defenses against potential threats. Report a security incident If you have questions or need to report a security or privacy incident, please visit our ConnectWise Trust Center. You can also call our Partner InfoSec Hotline at 1-888-WISE911 to report a non-active security incident or a security vulnerability. OCTOBER 18, 2023 BEWARE THE HOOK: MALICIOUS ACTOR PHISHING EMAIL TARGETING SCREENCONNECT USERS What we know Recently, our ConnectWise Information Security team has identified an increase in phishing campaigns that attempt to exploit ConnectWise ScreenConnect™ by mimicking new login alerts to deceive users into sharing their login credentials. These phishing emails are designed to appear as genuine login alerts to gain unauthorized access to legitimate ScreenConnect instances. We know email phishing attacks continue to get more sophisticated, mirroring authentic messages and web content, so we want to ensure you are informed about this threat and know how to protect your data and privacy. A sample of this phishing email is shown in the screenshot below and contains a “click here” link to a malicious site. Please note, ScreenConnect does send legitimate new login alerts via email as shown in this screenshot. ConnectWise alerts do not have a “click here” link for any login notifications. If you see a link in your notification, it is not legitimate. Our response With the evolving sophistication of phishing attempts on the rise, a combination of awareness and vigilance is needed. We encourage you to refresh your users with some of the standard phishing attack indicators. We also recommend staying vigilant in looking for clues to avoid mistakenly clicking on nefarious content. Before clicking, make sure content reflects: * Email domains owned by trusted sources * Links go to places you recognize What should you do? If you are concerned that you may have been compromised, please follow the steps in this security alert checklist. We also recommend reviewing the ScreenConnect security guide and best practices for further securing your instance, as well as verifying that links, your account ID, and your domain are accurate. If you have questions, suspect you received a phishing attempt, or need to report a security or privacy incident, please visit our ConnectWise Trust Center. You can report both a non-active security incident, report a security vulnerability, or call our Partner InfoSec Hotline at 1-888-WISE911. OCTOBER 4, 2023 WEBP/LIBWEBP ZERO-DAY VULNERABILITIES *This advisory has been updated to include the impact to ConnectWise PSA. Security researchers opened two vulnerabilities relating to maliciously formed WebP images, which could be used to exploit browsers, as well as the libwebp library that extends to more than just browsers. The libwebp library is used by many operating systems and popular applications to render .WebP images. What we know The vulnerability, first tracked as CVE-2023-4863, was disclosed by Google as a vulnerability affecting its Chrome browser. As researchers investigated further, it was discovered the vulnerability sourced back to the open source libwebp library, which several vendors rely on and have been releasing updates. In connection with this, CVE-2023-5129 that was registered as a critical CVSS (Common Vulnerability Scoring System) score of 10, has been rejected or withdrawn since it is a duplicate of CVE-2023-4863. The entry for the latter has been expanded to include the impact in the libwebp library. Our response Our cross-functional teams immediately started conducting comprehensive assessments of all our applications and systems to identify any potential areas of risk. Additionally, we have implemented enhanced monitoring measures to actively track any changes or suspicious activities related to this vulnerability. Remediation All identified products have started remediation efforts or have already been performed. In some cases, they are progressing as planned. In other instances where the vulnerability exists in independent products we use, we are monitoring and discussing with vendors to see when a fix would be available to apply. Remediation to date: * ConnectWise ScreenConnect™ v23.7.8 has been released, which disables the use of libwebp * ITBoost™, a ConnectWise solution, has been remediated and has been released into production * SLI 3.0 and SLI Insights have been remediated and released into production * Remediation efforts for ConnectWise PSA™ are ongoing. In the meantime, please consider moving to the web client instead of our thick client to reduce the risk of exposure to the vulnerability. * BrightGauge™, SmileBack™, ConnectWise CPQ™, ConnectWise Automate™, Asio™ platform, and security services are not directly impacted with this vulnerability While we are actively addressing this issue in our product suite, we recommend our partners take precautionary measures to enhance their security in their own environment by ensuring all their applications are up-to-date, regularly check for updates, and install them promptly. If you have additional questions, please contact security@connectwise.com. To report a security or privacy incident, please visit the ConnectWise Trust Center. You can report both a non-active security incident, report a security vulnerability, or call our Partner InfoSec Hotline at 1-888-WISE911. APRIL 14, 2023 <4:00PM ET> MICROSOFT MESSAGE QUEUING VULNERABILITY We have been made aware of a vulnerability affecting Windows Operating Systems running the Microsoft Message Queuing (MSMQ) service, impacting on-premise ConnectWise PSA partners. PSA cloud partners remain unaffected. This vulnerability allows adversaries to exploit TCP port 1801 within ConnectWise PSA and execute remote code without authorization. While no immediate threat has been detected, we strongly recommend you take the following actions immediately to mitigate this vulnerability: * Follow the steps outlined in Microsoft’s Mitigations * Update with the latest Microsoft patches * If you are unable to update with the latest Microsoft patches, as a temporary mitigation: * Disable the external connection for port 1801 If you have additional questions, please contact security@connectwise.com. DECEMBER 20, 2022 <6:52 PM ET>: BEST PRACTICE REMINDER - DOWNLOAD FROM TRUSTED SOURCES Researchers from ReversingLabs have identified malicious Python packages located on the popular Python package repository “Python Package Index (PyPI)” posing as a software development kit (SDK) from SentinelOne. The package mimics the legitimate SDK that's offered by SentinelOne to its customers but adds backdoor and data exfiltration features. The full article that includes the writeup and IOCs ( Data exfiltration IPs and package SHA1 hashes) can be found at this link, and the ConnectWise Security Operations Team has been provided the following information from SentinelOne: "SentinelOne is aware of the report from Reversing Labs regarding malicious packages uploaded to the PyPI (Python Package Index) repository misrepresenting themselves as SentinelOne SDK. A malicious Python package was first uploaded to PyPI on Dec 11, 2022, and as of Dec 13, 2022, the package had been updated 20 times. The report advises that the package contains a malicious backdoor with a programmatic delay before activation. We have confirmed that our customers are safe and have not seen any evidence of compromised clients due to this incident. Packages posting as legitimate software and leveraging the PyPI repository are becoming more common and are part of a trend toward integrating threats into software supply chains and development pipelines. We recommend only using SDK packages provided through the SentinelOne management console. PyPI has removed the malicious package, and we are working to investigate further." As an industry best practice, ConnectWise recommends partners download content (SDKs, executables, installation packages, etc.) directly from the vendor to minimize risk and always verify script content prior to execution. DECEMBER 13, 2022 <11:21 PM ET>: SENTINELONE/AIKIDO VULNERABILITY-ACTION REQUIRED Vulnerability Type: Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability Details SafeBreach Labs researcher Or Yair uncovered vulnerabilities in several leading EDR and AV solutions, including SentinelOne, that allows a non-privileged user to create NTFS reparse points, which creates a path that “links” to a different path. The SentinelOne agent uses Windows functionality to get a path of a file to mitigate. A malicious actor may replace the path with a different path to a file to which it does not have privileges. This can potentially turn the agent into a malicious data wiper. Products Impacted Microsoft Windows with SentinelOne agents running all versions prior to 22.2.4.558 are vulnerable. SentinelOne agents are utilized in the following ConnectWise products: ConnectWise SentinelOne Control, ConnectWise SentinelOne Complete, ConnectWise MDR with SentinelOne, and ConnectWise MDR Premium with SentinelOne. This exploit was also tested against Defender, Defender for Endpoint, TrendMicro Apex One, Avast Antivirus, and AVG Antivirus and was found to be vulnerable. Mitigation In order to be protected, you are required to install the latest SentinelOne policy override in version 22.2 SP1 (22.2.4.558) on your Windows agent endpoints. ConnectWise SOC teams have already updated all the ConnectWise SentinelOne EDR and MDR consoles with the 22.2.4.558 agent. After the updates have been deployed, please verify in the SentinelOne console if your machine has a pending reboot that needs to be actioned in case this is required to complete the installation. If you have any questions about the updating process, please contact our security support teams at securitypartnersupport@connectwise.com. NOVEMBER 29, 2022 <4:00 PM ET>: REMAINING VIGILANT AGAINST EMAIL PHISHING ATTEMPTS We are aware of a phishing campaign that mimics ConnectWise Control New Login Alert emails and has the potential to lead to unauthorized access to legitimate Control instances. We know email phishing attacks continue to get more sophisticated, mirroring legitimate email and web content. A sample of this phishing email is shown in the screenshot below and contains a “click here” link to a malicious site. ConnectWise has issued take-down requests for the malicious site and domains. If you are concerned that you may have been compromised, please follow the steps in this security alert checklist. We also recommend reviewing the Control security guide and best practices for further securing your instance, as well as verifying that links, your account ID, and your domain are accurate. Of note, Control does send legitimate New Login Alerts via email as shown in this screenshot. The legitimate “click here” link references the aforementioned security alert checklist that exists as a knowledge base article on our site. This is a more sophisticated attempt – some of the standard phishing attack indicators aren’t there, like misplaced graphics, or spelling inconsistencies. We encourage our partners to stay vigilant in looking for clues to avoid mistakenly clicking on nefarious content. Before clicking, make sure content reflects: * Email domains owned by trusted sources * Links that go to places you recognize If you have questions, suspect you received a phishing attempt, or need to report a security or privacy incident, please visit our ConnectWise Trust Center. You can report both a non-active security incident, report a security vulnerability, or call our Partner InfoSec Hotline at 1-888-WISE911. MAY 5, 2022 <11:00 AM ET>: EMAIL SECURITY BEST PRACTICES We want to provide reminders to our partners about email security best practices. Phishing remains a significant attack vector fronting attack chains in some very high-profile security incidents. As such, it is imperative that organizations implement email security controls to prevent impersonation/spoofing of their users and domains. SPF, DKIM, and DMARC provide a layer of protection against this by working in tandem to authenticate email and helping to ensure that the sender REALLY is who they say they are. SPF, DKIM, and DMARC Defined * SPF (Sender Policy Framework) is an email validation protocol designed to detect and block email spoofing. It allows mail exchangers to verify that incoming mail from a specific domain comes from an IP Address authorized by that domain’s administrators. * DKIM (DomainKeys Identified Mail) utilizes cryptographic signatures by which mail service providers can verify the authenticity of the sender. * DMARC (Domain-based Message Authentication, Reporting & Conformance) aligns the SPF and DKIM mechanisms and allows organizations to apply policies regarding unauthorized use of email domains. For more information and details on how to setup/configure SPF/DKIM/DMARC, there are several good resources available including the following: SPF: https://www.proofpoint.com/us/threat-reference/spf DKIM: https://www.proofpoint.com/us/threat-reference/dkim DMARC: https://www.proofpoint.com/us/threat-reference/dmarc Security is a top priority at ConnectWise. Our primary goal is to provide robust, secure products and services to our partners. We also acknowledge that no technology is perfect, and ConnectWise believes that working with skilled security researchers and partners across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us via our Vulnerability Disclosure Program. We welcome working with you to resolve the issue promptly. We are proud to be part of a community that remains equally committed to secure practices. JANUARY 31, 2022 <8:00 PM ET>: CONNECTWISE VIRTUAL COMMUNITY UPDATE We apologize to our partners for the disruption in service last week pertaining to our virtual community. It is now online, and our product and other teams look forward to engaging with you. Like many ConnectWise experiences (e.g. our University) our virtual community platform leverages SSO to authenticate users and ensure only authorized partners engage in our community. Our SSO mechanism did its job—only allowing verified ConnectWise partners to register, accept the terms and conditions and use the virtual community platform. There was no malicious attack on our SSO capabilities. Last week, a valued partner (via our VDP and respected admins of the MSPGeek community) raised concern about information our virtual community search was displaying to registered community member partners. Directory search was working as intended in most cases, but a configuration issue was allowing non-registered partners to be returned in a search. This information included "first name", "last name", "company name" (and in some cases, "business title"). Although this information can easily be obtained via other platforms (like LinkedIn), it raised understandable partner concern. Only 15 registered partner members conducted searches since the community launch, and while we were unable to validate the results of their searches due to a limitation in our vendor’s API, we do know that only 18 non-registered partners "profiles" were viewed by registered partner members as a result of those searches. We remediated this issue within hours but took the site down pending a full review in accordance with our InfoSec policy. No malicious activity was discovered, no data was lost, and this triggered no data privacy actions in the jurisdictions involved. Although a common community feature, partners also expressed concern that a registered partner community member could conduct a search by "company name". We understand it is important for partner employees (registered users) to determine how much or how little information is shared with others in the virtual community. Here’s what we did: * We reconfigured the virtual community to—after authentication—consume only basic information about registered users of the virtual community who accept the terms of service. * Default settings now limit directory search fields to first name and last name. * Member directory is “on” for registered partner member viewing to help deliver the experience TSPs expect when joining a virtual community. However, we have set default privacy settings for all registered members such that only their first name, last name (and profile photo where uploaded) will display when being searched for by members who aren’t their approved contacts. * Registered members may proactively change the privacy settings associated with their user profile to control the level of information that is shared with approved contacts or other members. Partners can find more information about privacy settings in the Virtual Community FAQs. As a courtesy, we are notifying the 18 individuals mentioned above and are reaching out to the 15 partners who conducted searches to gain their assurance this information will not be used beyond community networking. Finally, we know it is important to you to hear what we learned from this. Our beta testing (both internal and with partners) in the 30 days prior did not expose this configuration issue. This taught us about extra measures we can and will take in the future; and we have immediately implemented additional multi-layered testing and QC mechanisms to our processes. Transparency on all sides benefits our community. We want to thank the partner who reported this, and the partners who collaborated with us on this issue. If you have additional questions about this matter, please contact security@connectwise.com. Browse our Advisories Archive >> Ready to talk? Contact Us Chat Now 800.671.6898 Partner Support Solutions * Asio™ platform * Cybersecurity and Data Protection * Unified Monitoring and Management * Business Management * Solution Marketplace For Partners * ConnectWise University™ Login * ConnectWise Home Login * ConnectWise Virtual Community™ * Getting Help * Documentation * Partner Services * Partner Communications * Partner Referral Resources * Resource Center * Blog * Events * Webinars * Podcasts * The IT Nation * Online Community Company * Mission & Vision * History * Awards * Press Room * Careers * Distributors * Contact Us * Careers Stay up to date CountryAfghanistanAlbaniaAlgeriaAland IslandsAmerican SamoaAnguillaAndorraAngolaAntilles - NetherlandsAntigua and BarbudaAntarcticaArgentinaArmeniaAustraliaAustriaArubaAzerbaijanBosnia and HerzegovinaBarbadosBangladeshBelgiumBurkina FasoBulgariaBahrainBurundiBeninBermudaBrunei DarussalamBoliviaBrazilBahamasBhutanBouvet IslandBotswanaBelarusBelizeCambodiaCameroonCanadaCape VerdeCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaCongoIvory CoastCook IslandsCosta RicaCroatiaCyprusCzech RepublicDemocratic Republic of the CongoDjiboutiDenmarkDominicaDominican RepublicEcuadorEgyptEl SalvadorEast TimorEstoniaEquatorial GuineaEritreaEthiopiaFinlandFijiFalkland IslandsFederated States of MicronesiaFaroe IslandsFranceFrench GuianaFrench PolynesiaGabonGambiaGermanyGhanaGibraltarGreat BritainGrenadaGeorgiaGreeceGreenlandGuineaGuadeloupeS. Georgia and S. Sandwich IslandsGuatemalaGuamGuinea-BissauGuyanaHong KongHeard Island and McDonald IslandsHondurasHaitiHungaryIndonesiaIrelandIsraelIndiaBritish Indian Ocean TerritoryIraqItalyJamaicaJordanJapanKenyaKyrgyzstanKiribatiComorosSaint Kitts and NevisKorea SouthKuwaitCayman IslandsKazakhstanLaosLebanonSaint LuciaLiechtensteinSri LankaLiberiaLesothoLithuaniaLuxembourgLatviaLibyaMacedoniaMacaoMadagascarMalaysiaMaliMalawiMauritaniaMarshall IslandsMartiniqueMauritiusMayotteMaltaMexicoMoroccoMonacoMoldovaMongoliaMyanmarNorthern Mariana IslandsMontserratMaldivesMozambiqueNamibiaNew CaledoniaNigerNorfolk IslandNigeriaNicaraguaNetherlandsNorwayNepalNauruNiueNew ZealandOmanPanamaPeruPapua New GuineaPhilippinesPakistanPolandSaint Pierre and MiquelonSerbia and MontenegroPitcairnPuerto RicoPalestinian TerritoryPortugalPalauParaguayQatarReunionRomaniaRussian FederationRwandaSaudi ArabiaSamoaSaint HelenaSaint Vincent and the GrenadinesSan MarinoSao Tome and PrincipeSenegalSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSpainSudanSurinameSvalbard and Jan MayenSwedenSwitzerlandSwazilandTaiwanTanzaniaTajikistanThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUkraineUgandaUnited Arab EmiratesUnited KingdomUnited StatesUnited States Minor Outlying IslandsUruguayUzbekistanVanuatuVatican City StateVenezuelaVirgin IslandsVirgin IslandsViet NamWallis and FutunaWestern SaharaYemenZambiaZimbabwe Submit ©2024 ConnectWise, LLC. All rights reserved. Terms Privacy Policy Trust We use cookies to enhance site navigation, analyze site usage and assist in our marketing efforts. You can accept, reject or customize your preferences by clicking the cookie settings button. Our privacy policy provides more information and explains how to amend your cookie settingsPrivacy Policy Reject All Cookies Accept All Cookies Customize Choices PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. View Vendor Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. View Vendor Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. View Vendor Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. View Vendor Details Back Button VENDORS LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All