{"vulnerability": "CVE-2023-25718", "sightings": [{"uuid": "13b93cd2-a103-480c-bbc6-ab69362df6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25718", "type": "seen", "source": "https://t.me/cibsecurity/58025", "content": "\u203c CVE-2023-25718 \u203c\n\nThe cryptographic code signing process and controls on ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect) are cryptographically flawed. An attacker can remotely generate or locally alter file contents and bypass code-signing controls. This can be used to execute code as a trusted application provider, escalate privileges, or execute arbitrary commands in the context of the user. The attacker tampers with a trusted, signed executable in transit.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-13T22:30:03.000000Z"}, {"uuid": "c46cebbb-dbd3-40e4-b598-c789c9055747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25718", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18812", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25718\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations.\n\ud83d\udccf Published: 2023-02-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T21:22:58.320Z\n\ud83d\udd17 References:\n1. https://www.connectwise.com\n2. https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/\n3. https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity\n4. https://www.connectwise.com/blog/cybersecurity/the-importance-of-responsible-security-disclosures\n5. https://m.youtube.com/watch?v=fbNVUgmstSc&amp;pp=0gcJCf0Ao7VqN5tD", "creation_timestamp": "2025-06-18T21:40:38.000000Z"}]}