The February 2024 Self Hosted Screen Connect Vulnerability Explained

Поділитися
Вставка
  • Опубліковано 27 вер 2024

КОМЕНТАРІ • 40

  • @DPCTechnology
    @DPCTechnology 7 місяців тому +20

    Every month when I feel like I'm sending in the mortgage payment for a chalet in The Alps to Huntress. I remind myself of days like this... Bravo once again to the team over there...

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  7 місяців тому +5

      Yes, Huntress was right on top of this making them an easy source to cite.

    • @StevenLastname
      @StevenLastname 7 місяців тому +4

      Huntress is expensive, but definitely worth it in my opinion. They've saved my clients on a couple of occasions in the last couple years!

    • @DPCTechnology
      @DPCTechnology 7 місяців тому +6

      @@StevenLastname yeah, when you add in the fact that they do managed AV with defender it actually is pretty reasonable... We just have a gazillion seats.. at the end of the day it's all about how good it does at detecting things and avoiding catastrophe.. well worth the insurance payment in my book....

    • @DPCTechnology
      @DPCTechnology 7 місяців тому +6

      @@LAWRENCESYSTEMS yeah I came stomping in the office telling everybody to get on it when I saw it online and they said " already patched, huntress alerted us hours ago"

    • @Agnemons
      @Agnemons 7 місяців тому

      Insurance is always a complete waste of money. UNTIL you need it.
      Then, if you haven't got it, it's a complete waste of time trying to get it.@@DPCTechnology

  • @pjaz6800
    @pjaz6800 7 місяців тому +4

    Your live stream saved my instance. Small restaurant company, was able to get it off before I could get hit. Thank you for your awesome content.

  • @IM_A_BEAR_LOL
    @IM_A_BEAR_LOL 7 місяців тому +3

    I had just updated the morning before the patch was released. I didn't hear about the exploit or need to patch until your livestream video, so thank you!

  • @AndrewHargreave
    @AndrewHargreave 7 місяців тому +1

    Thanks for this! I'm also one who's had the self-hosted version since 2011 (and I've paid for subscription updates each year). I had tried to patch my self-hosted instance back in Oct but the patch broke my setup for some reason. I restored back to the working version (yay backups!) and told myself to come back to it when I had more time to troubleshoot. Well, that time didn't come. I wasn't able to discern from the emails sent on the detail that they were invalidating the licenses for those not patched so I spent an inordinate amount of time yesterday getting patched to the current version. I got it working but thought I had actually been infected (running multiple scans with no results had me worried)....now I realize they just blocked my server from validating the license which blocked my access. So your video has eased my mind quite a bit! Thanks!

  • @06TundraLTD
    @06TundraLTD 7 місяців тому +4

    self-hosted server since 2014, one of the best tools I bought

    • @Monarchias
      @Monarchias 6 місяців тому

      But the Cloud! They all say it's easy and cheap! Any iterations. On the other hand what is yours is yours. More responsibility? Yes.

  • @BigHeadClan
    @BigHeadClan 7 місяців тому +3

    The MSP I work for uses screen connect (as our backup Remote access solution) our ITSec guys are awesome and all over it the day it was announced. Pushed a script to uninstall it from every computer in our Management tool and simply reinstalled with the latest version on the machines that still did need it for vendors.
    My condolences to those IT departments for local schools and stuff they are unlikely to be setup in a way to easily roll out such a change.

  • @itandgeneral4308
    @itandgeneral4308 7 місяців тому +13

    We appreciate your mission to raise security awareness. Thank you for keeping us informed.

  • @kennethjames2512
    @kennethjames2512 7 місяців тому

    I updated because of the video you released on Tuesday, Thank you. I never received an email from screenconnect even though the email is in the users.xml file. This was a scary exploit

  • @f-s-r
    @f-s-r 7 місяців тому +1

    It looks like nowadays everything that is as exposed as this would need automatic updates.

    • @thompsonmatthew
      @thompsonmatthew 7 місяців тому

      Spot on. Regrettably, I predict the company will just use this as an excuse to go cloud-only.

  • @mathesonstep
    @mathesonstep 7 місяців тому

    I think they took the best course of action, I really like that they are forcing people to upgrade

  • @raniljaramillo9821
    @raniljaramillo9821 6 місяців тому

    Hi Tom I'm amazed how you get informed of the new security issues, what sites are following or subscribe to?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 місяців тому

      I use FreshRSS and I have a lot of news sites ua-cam.com/video/wcof-Noho9Q/v-deo.htmlsi=_Ym3NNxBtaVz8293

  • @deathvaps
    @deathvaps 7 місяців тому

    Gracias por la informacion, saludos desde Colombia!

  • @brandonwaldman5496
    @brandonwaldman5496 7 місяців тому

    I appreciate your video :)

  • @MelodicMurder
    @MelodicMurder 7 місяців тому

    Do you have any info on the change healthcare hack?

  • @edelbeneatp
    @edelbeneatp 7 місяців тому

    Great video. I do cringe every time I hear "on premise" though, hah. It always cracks me up how shortening premises to prem has made people think that it means premise.

  • @strikesbac
    @strikesbac 7 місяців тому

    @Tom what solution are you using for your customers?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  7 місяців тому

      We use ScreenConnect / Connectwise Control

    • @strikesbac
      @strikesbac 7 місяців тому

      @@LAWRENCESYSTEMS Ahh cool. To be honest I was slightly concerned, we had been using AnyDesk and with their recent breach decided to move. Most of the feedback I’d had suggested that SC was a good alternative, I was just about to buy it when the CVE was announced! I thought it was prudent to see how they handled it before deciding.

  • @user-lm3ll1jp7f
    @user-lm3ll1jp7f 7 місяців тому

    Are you staying with ScreenConnect/Connectwise?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  7 місяців тому +1

      For now, yes.

    • @user-lm3ll1jp7f
      @user-lm3ll1jp7f 7 місяців тому

      @@LAWRENCESYSTEMS ok, cool, is it known who spotted this in the wild and reported it?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  7 місяців тому +1

      @@user-lm3ll1jp7f It was reported to Connectwise by someone who did not want to have their name known.

  • @scoovyspoh891
    @scoovyspoh891 7 місяців тому

    👍

  • @andrewr7820
    @andrewr7820 7 місяців тому +4

    Tom, Props for you to doing a PSA for events like this. You are a genuine asset to the IT community and their users everywhere. Thank you!

  • @wpochert
    @wpochert 7 місяців тому

    they refuse to update or patch the linux version.. because 3 years ago they stopped releasing new versions for linux. ..there are TONS of self hosted linux instances of screenconnect out there... windows based vps are alot more expensive than linux. Connectwise needs to do the right thing and patch their last linux release.

  • @QuantumKurator
    @QuantumKurator 7 місяців тому +1

    This shows the advantage of going with the SaaS version vs self-hosted, but I get there are pros and cons both types of platforms.

  • @jordancalhouncom
    @jordancalhouncom 7 місяців тому +1

    Thankful for your live stream the other was able to see the thumbnail and immediately patch our systems! Crazy teams don’t keep on the latest versions with the generous discount they offer to renew a license for such a powerful tool for them and bad actors

  • @MJGZ51
    @MJGZ51 7 місяців тому

    Thanks, Tom for the heads-up. I watched your live stream. I'm not sure how they're allowing the bypassing of existing license validation. I'm on version 6 from 2017 (like many - it worked and I didn't need the newer features) and it will not allow my to upgrade.