Metrics
Affected Vendors & Products
No advisories yet.
Solution
Cloud: Cloud instances have already been updated to the latest Automate release. On-premise: Apply the 2025.9 release.
Workaround
No workaround given by the vendor.
Thu, 16 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 16 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492. | |
Title | Self-Update Verification Mechanism Process in ConnectWise Automate | |
Weaknesses | CWE-494 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ConnectWise
Published:
Updated: 2025-10-17T03:55:32.171Z
Reserved: 2025-10-08T11:26:01.814Z
Link: CVE-2025-11493

Updated: 2025-10-16T19:59:43.042Z

Status : Received
Published: 2025-10-16T19:15:32.073
Modified: 2025-10-16T19:15:32.073
Link: CVE-2025-11493

No data.

No data.