CrowdSec
5/10CrowdSec Score

ConnectWise ManagedITSync - SQLi (CVE-2017-18362)

Published on05-02-2019
First seen on05-11-2025
Public ExploitCVSS 9.8/10ConnectWise - ManagedITSync

363Exploiting IPs reported

ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.

CrowdSec analysis

CVE-2017-18362 is a critical vulnerability in the ConnectWise ManagedITSync integration for Kaseya VSA, allowing unauthenticated attackers to execute arbitrary SQL commands and gain full access to the VSA database remotely. This flaw has been actively exploited in the wild, enabling threat actors to deploy ransomware across all endpoints managed by the affected VSA server. Attackers can leverage this vulnerability to read, modify, or destroy sensitive data, posing a severe risk to organizations using vulnerable versions.

CrowdSec has been tracking this vulnerability and its exploits since 29th of October 2025.

According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2017-18362 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2017-18362 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2017-18362 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.

Attackers exploit this vulnerability by sending requests to the /KaseyaCwWebService/ManagedIT.asmx endpoint, often looking for operations like ExecuteSQLQuery to run arbitrary SQL commands without authentication.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.