Microsoft-HTTPAPI 2.0
tcp/8040
ScreenConnect 23.9.10.8817-2758973145
tcp/8040
The following ConnectWise ScreenConnect is publicly accessible and is vulnerable :
It is critical to update to a safe version as soon as possible since a vulnerability allow remote attackers to create administrative users on the service. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 0aef249104a4b7b068d399e6a933d6dca933d6dca933d6dca933d6dca933d6dc
Found vulnerable ConnectWise ScreenConnect: Affected by CW-2024-02-20
Open service 99.253.238.105:8040
2024-12-22 00:25
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-2758973145 Microsoft-HTTPAPI/2.0 Date: Sun, 22 Dec 2024 00:25:07 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>
Open service 99.253.238.105:8040
2024-12-20 00:18
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-2758973145 Microsoft-HTTPAPI/2.0 Date: Fri, 20 Dec 2024 00:18:34 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>
Open service 99.253.238.105:8040
2024-12-18 00:27
HTTP/1.1 302 Found Cache-Control: private Content-Length: 134 Content-Type: text/html; charset=utf-8 Location: /SetupWizard.aspx Server: ScreenConnect/23.9.10.8817-2758973145 Microsoft-HTTPAPI/2.0 Date: Wed, 18 Dec 2024 00:27:53 GMT Connection: close Page title: Object moved <html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/SetupWizard.aspx">here</a>.</h2> </body></html>