Microsoft-HTTPAPI 2.0
tcp/8040
ScreenConnect 23.9.10.8817-1565819871
tcp/8040
The following ConnectWise ScreenConnect is publicly accessible and is vulnerable :
It is critical to update to a safe version as soon as possible since a vulnerability allow remote attackers to create administrative users on the service. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 0aef249104a4b7b068d399e6a933d6dca933d6dca933d6dca933d6dca933d6dc
Found vulnerable ConnectWise ScreenConnect: Affected by CW-2024-02-20
Open service 72.204.157.219:8040
2024-12-22 00:26
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-1565819871 Microsoft-HTTPAPI/2.0 Date: Sun, 22 Dec 2024 00:29:35 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>
Open service 72.204.157.219:8040
2024-12-20 00:18
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-1565819871 Microsoft-HTTPAPI/2.0 Date: Fri, 20 Dec 2024 00:21:21 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>
Open service 72.204.157.219:8040
2024-12-18 00:28
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-1565819871 Microsoft-HTTPAPI/2.0 Date: Wed, 18 Dec 2024 00:30:58 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>