Project Subscriptions
No data.
No advisories yet.
Solution
Cloud: No action is required. ScreenConnect servers hosted in “screenconnect.com” cloud (standalone and Automate/RMM integrated) or “hostedrmm.com” for Automate partners have been updated to remediate the issue. On-premise ScreenConnect Partners: Please upgrade to ScreenConnect version 26.1. Visit Download | ScreenConnect page to download and apply the update (access requires a valid on-premises license). * If your license is out of maintenance, you must upgrade your license https://docs.connectwise.com/ScreenConnect_Documentation/On-premises/On-premises_licensing/Renew_or_upgrade_an_on-premises_license before installing the latest supported release of ScreenConnect. * For instructions on updating to the newest release, please reference this doc: Upgrade an on-premise installation - ConnectWise Automate On-Prem Partners with ScreenConnect Integration: For partners using an on-premises ScreenConnect installation integrated with Automate, ScreenConnect 26.1 is available through the Automate Product Updates https://docs.connectwise.com/ConnectWise_Automate_Documentation/Automate_Product_Updates page. Link to release notes: ScreenConnect 26.1 / ScreenConnect https://screenconnect.product.connectwise.com/communities/26/topics/5088-screenconnect-261
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios. | |
| Title | ScreenConnect Instance Level Cryptographic Material Exposure | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ConnectWise
Published:
Updated: 2026-03-17T15:24:48.838Z
Reserved: 2026-03-04T20:04:12.757Z
Link: CVE-2026-3564
Updated: 2026-03-17T15:24:45.359Z
Status : Received
Published: 2026-03-17T15:16:19.253
Modified: 2026-03-17T15:16:19.253
Link: CVE-2026-3564
No data.
OpenCVE Enrichment
No data.