Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-6066
Analyzed
More InfoOfficial Page
Source-7d616e1a-3288-43b1-a0dd-0a65d3e70a49
View Known Exploited Vulnerability (KEV) details
Published At-20 Apr, 2026 | 16:16
Updated At-23 Apr, 2026 | 14:18

ConnectWise has released a security update for ConnectWise Automate™ that addresses a behavior in the ConnectWise Automate Solution Center where certain client-to-server communications could occur without transport-layer encryption. This could allow network‑based interception of Solution Center traffic in Automate deployments. The issue has been resolved in Automate 2026.4 by enforcing secure communication for affected Solution Center connections.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CPE Matches

connectwise
connectwise
>>automate>>Versions before 2026.4(exclusive)
cpe:2.3:a:connectwise:automate:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Secondary7d616e1a-3288-43b1-a0dd-0a65d3e70a49
CWE ID: CWE-319
Type: Secondary
Source: 7d616e1a-3288-43b1-a0dd-0a65d3e70a49
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.connectwise.com/company/trust/security-bulletins/2026-04-20-connectwise-automate-bulletin7d616e1a-3288-43b1-a0dd-0a65d3e70a49
Vendor Advisory
Hyperlink: https://www.connectwise.com/company/trust/security-bulletins/2026-04-20-connectwise-automate-bulletin
Source: 7d616e1a-3288-43b1-a0dd-0a65d3e70a49
Resource:
Vendor Advisory
Change History
0Changes found

Details not found