ConnectWise Patches a Critical RCE

ConnectWise Patches a Critical RCE


ConnectWise has patched a critical RCE flaw impacting Recover and R1Soft Server Backup Manager.

The vulnerability is an Improper Neutralization of Special Elements in Output Used by a Downstream Component.

An attacker can exploit the vulnerability to execute remote code or directly access confidential data.

Advertisements

ConnectWise Recover v2.9.7 and earlier versions and R1Soft SBM v6.16.3 and earlier versions were impacted by the vulnerability.

Researchers explained that the authentication bypass and sensitive file leak (CVE-2022-36537) affect the Java framework “ZK” Ajax web application framework used within the ConnectWise R1Soft software Server Backup Manager SE.

In a PoC explained by the researchers explained the below steps

  • Bypass authentication,
  • Upload a backdoored JDBC database driver to gain code execution
  • Use the REST API to trigger commands to registered agents to ultimately push the  recently leaked Lockbit 3.0 ransomware to all downstream endpoints.

Researchers is not aware of active exploitation of the vulnerability in the wild.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.