Critical RCE Vulnerability Reported in ConnectWise Server Backup Solution

IT service management software platform ConnectWise has released Software patches for a critical security vulnerability in Recover and R1Soft Server Backup Manager (SBM).

The issue, characterized as a “neutralization of Special Elements in Output Used by a Downstream Component,” could be abused to result in the execution of remote code or disclosure of sensitive information.

ConnectWise’s advisory notes that the flaw affects Recover v2.9.7 and earlier, and R1Soft SBM v6.16.3 and earlier are impacted by the critical flaw.

The issue is tied to an upstream authentication bypass vulnerability in the ZK open-source Ajax web application framework (CVE-2022-36537), which was initially patched in May 2022.

Affected ConnectWise Recover SBMs have automatically been updated to the latest version of Recover (v2.9.9),” the company said, urging customers to upgrade to SBM v6.16.4, shipped on October 28, 2022.

While there is no evidence of active exploitation of the vulnerability in the wild, a proof-of-concept devised by Huntress researchers John Hammond and Caleb Stewart shows that it can be abused to bypass authentication, gain remote code execution on SBM, and push LockBit 3.0 ransomware to all downstream endpoints.

“It is important to note that the upstream ZK vulnerability not only affects R1Soft but also any application utilizing an unpatched version of the ZK framework,” the researchers said.

The access an attacker can gain through this authentication bypass vulnerability is specific to the exploited application. However, other applications have serious potential to be affected similarly to R1Soft Server Backup Manager.

Source: THN