CVE-2025-3935
ViewState Injection in ScreenConnect Enables Remote Code Execution

Publication date: 2025-04-25

Last updated on: 2025-06-03

Assigner: 7d616e1a-3288-43b1-a0dd-0a65d3e70a49

Description
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
screenconnect screenconnect *
connectwise screenconnect to 25.2.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 Improper Authentication
AI Powered Q&A
Can you explain this vulnerability to me?


How can this vulnerability impact me? :


What immediate steps should I take to mitigate this vulnerability?


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
Meta Information
CVE Publication Date:
2025-04-25
CVE Last Modified Date:
2025-06-03
Report Generation Date:
2025-07-24
AI Powered Q&A Generation:
2025-04-26
EPSS Last Evaluated Date:
2025-07-02
NVD Report Link: