CVE-2025-11493
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-16

Last updated on: 2025-10-29

Assigner: ConnectWise

Description
The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-16
Last Modified
2025-10-29
Generated
2026-05-07
AI Q&A
2025-10-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
connectwise automate to 2025.9 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-494 The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because the ConnectWise Automate Agent does not fully verify the authenticity of files it downloads from the server, such as updates, dependencies, and integrations. As a result, an attacker positioned on the network path could perform a man-in-the-middle attack and replace legitimate files with malicious ones by pretending to be the legitimate server. The risk is reduced if HTTPS is enforced.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to deliver malicious files to your system by intercepting and substituting legitimate files during download. This could lead to compromise of confidentiality, integrity, and availability of your system, potentially resulting in unauthorized access, data corruption, or service disruption.


What immediate steps should I take to mitigate this vulnerability?

Enforce the use of HTTPS for all communications between the ConnectWise Automate Agent and its servers to mitigate the risk of man-in-the-middle attacks substituting malicious files for legitimate ones.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart