{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T19:06:52.029","vulnerabilities":[{"cve":{"id":"CVE-2025-3935","sourceIdentifier":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","published":"2025-04-25T19:15:49.143","lastModified":"2025-10-24T13:55:32.970","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. \nIt is important to note that to obtain these machine keys, privileged system level access must be obtained. \n\n\n\nIf these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. \n\n\n\nThe risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it."},{"lang":"es","value":"Las versiones 25.2.3 y anteriores de ScreenConnect pueden ser susceptibles a un ataque de inyección de código de ViewState. Los formularios web ASP.NET utilizan ViewState para preservar el estado de las páginas y los controles, con datos codificados en Base64 protegidos por claves de máquina. Es importante tener en cuenta que para obtener estas claves de máquina, se requiere acceso privilegiado al sistema. Si estas claves de máquina se ven comprometidas, los atacantes podrían crear y enviar un ViewState malicioso al sitio web, lo que podría provocar la ejecución remota de código en el servidor. El riesgo no se debe a una vulnerabilidad introducida por ScreenConnect, sino a un comportamiento a nivel de plataforma. Esto no tuvo un impacto directo en el cliente de ScreenConnect. El parche 2025.4 de ScreenConnect deshabilita ViewState y elimina cualquier dependencia de él."}],"metrics":{"cvssMetricV31":[{"source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"cisaExploitAdd":"2025-06-02","cisaActionDue":"2025-06-23","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"ConnectWise ScreenConnect Improper Authentication Vulnerability","weaknesses":[{"source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*","versionEndExcluding":"25.2.4","matchCriteriaId":"552C1CC0-4F75-4C28-ACEF-EF1C1AD50EC2"}]}]}],"references":[{"url":"https://www.connectwise.com/company/trust/advisories","source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","tags":["Vendor Advisory"]},{"url":"https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4","source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-3935","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}