Security
ConnectWise Resolves Automate Vulnerability to Guard Against AiTM Update Attacks

ConnectWise Addresses Critical Vulnerabilities in Automate Product
ConnectWise has recently released a security update to rectify vulnerabilities, including one with critical severity, in its Automate product. These vulnerabilities posed a risk of exposing sensitive communications to interception and modification.
ConnectWise Automate serves as a remote monitoring and management (RMM) platform utilized by managed service providers (MSPs), IT service companies, and internal IT departments within large enterprises. It functions as a central management hub with elevated privileges to oversee numerous client machines.
The most severe vulnerability that ConnectWise addressed, known as CVE-2025-11492 with a severity rating of 9.6, allowed for the cleartext transmission of sensitive information. This flaw permitted agents to communicate over insecure HTTP instead of encrypted HTTPS, potentially enabling adversary-in-the-middle (AitM) attacks to intercept or modify traffic, including commands, credentials, and update payloads.
Another vulnerability, identified as CVE-2025-11493 with an 8.8 severity score, involved a lack of integrity verification for update packages, their dependencies, and integrations. By exploiting these security issues in tandem, an attacker could maliciously push files as legitimate ones by impersonating a valid ConnectWise server.
ConnectWise has categorized the security update as a moderate priority. While cloud-based instances have already been updated to the latest Automate release, 2025.9, administrators of on-premise deployments are advised to promptly install the new release to mitigate potential risks.
Although there is no mention of active exploitation in the security bulletin, ConnectWise warns that the vulnerabilities present a higher risk of being targeted by exploits in the wild. Notably, threat actors have previously exploited critical-severity flaws in ConnectWise products, prompting the company to undertake measures such as rotating digital code signing certificates to enhance security.
Picus Blue Report 2025 Highlights Password Security Concerns
According to the Picus Blue Report 2025, 46% of environments experienced cracked passwords, nearly doubling from the previous year’s figure of 25%. The report offers comprehensive insights into prevention, detection, and data exfiltration trends.
-
Facebook3 days ago
Warning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook4 days ago
InstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook3 days ago
Facebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Video Games4 days ago
Goku Takes on the Dragon Ball FighterZ Arena
-
Video Games5 days ago
Tekken 8: Rise of the Shadows
-
Amazon5 days ago
Neil Young Takes a Stand: Pulling Music from Amazon in Protest of Jeff Bezos’ Support for Trump
-
Microsoft3 days ago
Microsoft Integrates Anthropic’s Claude AI Models into 365 Copilot: A Deepening Relationship with OpenAI
-
Cars3 days ago
Revving into the Future: Ferrari’s Plan to Unleash 20 New Models, Including Electric Vehicles, by 2030