Home » Technology » ConnectWise Automate Security Update Addresses Critical Vulnerabilities

ConnectWise Automate Security Update Addresses Critical Vulnerabilities

by Rachel Kim – Technology Editor

ConnectWise Patches Automate Software to Block Malicious Update Attacks

ConnectWise has released a security update for its Automate remote monitoring and⁣ management (RMM) platform to address two⁤ vulnerabilities that could allow attackers to ⁢deliver malware or​ malicious updates disguised as legitimate software. The flaws, if exploited, could enable a “man-in-the-middle” (AiTM) attack, compromising the integrity of the update process.

The vulnerabilities center around a lack of encryption and integrity verification for update ⁤packages. According to ConnectWise, ‍the software was “configured to use HTTP or rely on encryption, ⁣that could allow a network-based adversary to view or modify traffic or⁢ substitute malicious updates.” The second issue, tracked as CVE-2025-11493 with‌ a severity score of 8.8, stems‌ from a missing⁣ checksum or digital signature for update packages, dependencies, and integrations. Combined, these weaknesses would ⁢allow an attacker to ⁤impersonate⁢ a valid ConnectWise⁤ server and push ‍malicious files.

ConnectWise has already applied the fix to its⁤ cloud-based Automate instances,updating them to release 2025.9. Administrators using on-premise ‌deployments are strongly advised to install the update “as soon as possible (within days),”⁣ according to the vendor. While no ‍active exploitation has been reported, ConnectWise warns⁤ the‌ vulnerabilities “have higher risk of being targeted by exploits in the ‌wild.”

This security update arrives amid‌ heightened scrutiny of ConnectWise’s security practices. Earlier this year, the ⁤company suffered a breach attributed to nation-state​ actors, impacting ScreenConnect customers and forcing a complete rotation of its digital code signing​ certificates. Threat actors have previously exploited critical flaws ⁣in ConnectWise products,including a recent critical bug in ScreenConnect that saw exploit code ​released ⁢publicly.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.