ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. 
It is important to note that to obtain these machine keys, privileged system level access must be obtained.



If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. 



The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
Advisories

No advisories yet.

Fixes

Solution

Cloud: No action is required. On-premises: Upgrade to the latest stable version. Details and guidance can be found here: ScreenConnect 25.2.4 Security Patch https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Thu, 04 Sep 2025 06:00:00 +0900

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Thu, 04 Sep 2025 02:45:00 +0900

Type Values Removed Values Added
Weaknesses CWE-287

Thu, 04 Sep 2025 01:45:00 +0900

Type Values Removed Values Added
Weaknesses CWE-502

Thu, 05 Jun 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Connectwise
Connectwise screenconnect
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*
Vendors & Products Connectwise
Connectwise screenconnect

Tue, 03 Jun 2025 08:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

kev

{'dateAdded': '2025-06-02'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 26 Apr 2025 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 26 Apr 2025 03:45:00 +0900

Type Values Removed Values Added
Description ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
Title ScreenConnect Exposure to ASP.NET ViewState Code Injection
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ConnectWise

Published:

Updated: 2025-10-21T22:55:17.656Z

Reserved: 2025-04-25T14:32:25.365Z

Link: CVE-2025-3935

cve-icon Vulnrichment

Updated: 2025-04-25T18:55:48.517Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-25T19:15:49.143

Modified: 2025-10-24T13:55:32.970

Link: CVE-2025-3935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses