The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below – CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect
The report was published by The Hacker News with a current urgency rating of 10/10 for this queue. Security teams should treat this as a timely item to review, especially where the affected products, vendors, or techniques overlap with their environment.
What We Know So Far
The source item was published at 2026-04-29T14:16:00+05:30 and is being tracked from The Hacker News. The available RSS summary indicates that the story is relevant because it matches site topics; published in the last 6 hours; mentions a CVE. Review the original report for full technical context, affected versions, and any vendor-specific remediation details.
Where a CVE, patch advisory, active exploitation note, or public proof-of-concept is involved, validate the details against the vendor advisory before making production changes. At the time this draft was generated, the RSS feed was the primary source used for this queue entry.
What You Should Do Now
- Read the source report and confirm whether your organization uses the affected product, service, or dependency.
- Check vendor advisories for patched versions, mitigations, indicators of compromise, or detection logic.
- Prioritize exposed internet-facing systems, privileged services, and high-value environments first.
- Add the story to the next security review or incident triage cycle if it matches your technology stack.
- Keep this draft updated with confirmed version numbers and direct advisory links before publishing.
Thank you for reading this post, don't forget to subscribe!


Leave feedback about this