Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2025-3935", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2025-06-02T18:42:08.619233Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2025-06-02", "reference": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json"}}}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-25T18:55:48.517Z"}, "timeline": [{"lang": "en", "time": "2025-06-02T00:00:00+00:00", "value": "CVE-2025-3935 added to CISA KEV"}]}], "cna": {"title": "ScreenConnect Exposure to ASP.NET ViewState Code Injection", "source": {"discovery": "UNKNOWN"}, "impacts": [{"capecId": "CAPEC-115", "descriptions": [{"lang": "en", "value": "CAPEC-115 Authentication Bypass"}]}], "metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "affected": [{"vendor": "ConnectWise", "product": "ScreenConnect", "versions": [{"status": "affected", "version": "<25.2.3"}], "platforms": ["Microsoft ASP.NET"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "Cloud:\u00a0No action is required. \n\nOn-premises:\u00a0Upgrade to the latest stable version.\n\n\n\n\n\n\n\n\n\n\nDetails and guidance can be found here:\n\n ScreenConnect 25.2.4 Security Patch https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4", "supportingMedia": [{"type": "text/html", "value": "<p></p><b>Cloud: </b>No action is required. <br><br><b>On-premises: </b>Upgrade to the latest stable version.<br>\n\n\n\n\n\n\n\n\n\n<p>Details and guidance can be found here:\n\n<a target=\"_blank\" rel=\"nofollow\" href=\"https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4\">ScreenConnect 25.2.4 Security Patch</a>\n\n</p>\n\n\n\n\n<br>", "base64": false}]}], "references": [{"url": "https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4"}, {"url": "https://www.connectwise.com/company/trust/advisories"}], "x_generator": {"engine": "Vulnogram 0.2.0"}, "descriptions": [{"lang": "en", "value": "ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.\u00a0\nIt is important to note that to obtain these machine keys, privileged system level access must be obtained. \n\n\n\nIf these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.\u00a0\n\n\n\nThe risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.\u00a0 This had no direct impact to ScreenConnect Client.\u00a0ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.", "supportingMedia": [{"type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. \n<span style=\"background-color: rgb(255, 255, 255);\">It is important to note that to obtain these machine keys, privileged system level access must be obtained. </span>\n\n</span><br><br>I<span style=\"background-color: rgb(255, 255, 255);\">f these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. </span><span style=\"background-color: rgb(255, 255, 255);\"><br></span>\n\n<br>The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior. This had no direct impact to ScreenConnect Client. <span style=\"background-color: rgb(255, 255, 255);\">ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it. </span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", "base64": false}]}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-287", "description": "CWE-287 Improper Authentication"}]}], "providerMetadata": {"orgId": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49", "shortName": "ConnectWise", "dateUpdated": "2025-04-25T18:27:44.244Z"}}}, "cveMetadata": {"cveId": "CVE-2025-3935", "state": "PUBLISHED", "dateUpdated": "2025-06-06T03:55:31.542Z", "dateReserved": "2025-04-25T14:32:25.365Z", "assignerOrgId": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49", "datePublished": "2025-04-25T18:27:44.244Z", "assignerShortName": "ConnectWise"}, "dataVersion": "5.1"}