<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cleartext — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cleartext/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cleartext/feed.xml" rel="self" type="application/rss+xml"/><item><title>ConnectWise Automate Solution Center Cleartext Communication Vulnerability (CVE-2026-6066)</title><link>https://feed.craftedsignal.io/briefs/2026-04-connectwise-cleartext/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-connectwise-cleartext/</guid><description>ConnectWise Automate is vulnerable to CVE-2026-6066, a cleartext transmission of sensitive information vulnerability, where certain client-to-server communications could occur without transport-layer encryption, potentially allowing network-based interception of Solution Center traffic, and the issue is resolved in Automate 2026.4 by enforcing secure communication.</description><content:encoded><![CDATA[<p>ConnectWise Automate is a remote monitoring and management (RMM) platform used by managed service providers (MSPs). CVE-2026-6066 describes a vulnerability in the ConnectWise Automate Solution Center where specific client-to-server communications may occur without transport-layer encryption. An attacker positioned on the network could intercept sensitive data transmitted in cleartext. This vulnerability was disclosed on April 20, 2026, and affects ConnectWise Automate versions prior to 2026.4. Successful exploitation allows an attacker to potentially gain access to credentials, configuration details, and other sensitive information related to the managed clients. The vulnerability has been resolved in Automate 2026.4 by enforcing secure communication for affected Solution Center connections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to a ConnectWise Automate deployment.</li>
<li>Attacker passively monitors network traffic for communications between Automate clients and the Solution Center.</li>
<li>Attacker identifies vulnerable client-to-server communications occurring without transport-layer encryption.</li>
<li>Attacker intercepts the cleartext network traffic using a packet capture tool such as Wireshark or tcpdump.</li>
<li>Attacker analyzes the intercepted traffic to identify sensitive information such as credentials or configuration data.</li>
<li>Attacker uses the acquired credentials to gain unauthorized access to managed systems or customer environments.</li>
<li>Attacker leverages compromised systems for lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6066 can lead to the compromise of ConnectWise Automate deployments, potentially affecting hundreds or thousands of MSP clients. An attacker could intercept credentials, configuration data, and other sensitive information, leading to unauthorized access to managed systems. This could result in data breaches, ransomware attacks, and other malicious activities targeting MSP clients. The severity is amplified by the widespread use of ConnectWise Automate among MSPs and the potential for cascading effects across their customer base.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ConnectWise Automate to version 2026.4 or later to remediate CVE-2026-6066 as per the ConnectWise security bulletin (<a href="https://www.connectwise.com/company/trust/security-bulletins/2026-04-20-connectwise-automate-bulletin">https://www.connectwise.com/company/trust/security-bulletins/2026-04-20-connectwise-automate-bulletin</a>).</li>
<li>Implement network segmentation and monitoring to detect and prevent unauthorized network access and traffic interception.</li>
<li>Deploy the Sigma rule for unencrypted ConnectWise Automate communication to identify potentially vulnerable connections.</li>
<li>Review and enforce strong password policies and multi-factor authentication for all ConnectWise Automate accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-6066</category><category>connectwise</category><category>cleartext</category><category>rmm</category></item></channel></rss>