Description

In deployments using the ScreenConnectâ„¢ Certificate Signing Extension, encrypted configuration values including an Azure Key Vault-related key, could be returned to unauthenticated users through a client-facing endpoint under certain conditions. The values remained encrypted and securely stored at rest; however, an encrypted representation could be exposed in client responses. Updating the Certificate Signing Extension to version 1.0.12 or higher ensures configuration handling occurs exclusively on the server side, preventing encrypted values from being transmitted to or rendered by client-side components.

INFO

Published Date :

2025-12-18T15:50:06.929Z

Last Modified :

2025-12-18T16:04:17.893Z

Source :

ConnectWise
AFFECTED PRODUCTS

The following products are affected by CVE-2025-14823 vulnerability.

Vendors Products
Connectwise
  • Screenconnect
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-14823.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact