In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Oct 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:connectwise:automate:*:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Connectwise
Connectwise automate |
|
| Vendors & Products |
Connectwise
Connectwise automate |
Thu, 16 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications. | |
| Title | HTTP Configuration and Encryption in Transit | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ConnectWise
Published: 2025-10-16T18:59:35.285Z
Updated: 2025-10-17T03:55:31.431Z
Reserved: 2025-10-08T11:25:59.180Z
Link: CVE-2025-11492
No data.
Status : Analyzed
Published: 2025-10-16T19:15:31.900
Modified: 2025-10-29T19:33:29.790
Link: CVE-2025-11492
No data.
ReportizFlow