ConnectWise Recover Vulnerability Alert
March 1st, 2023: Multiple vulnerabilities found in ConnectWise Recover and R1Software leveraging ZK Framework for Java web development. These vulnerabilities allow for arbitrary code execution, privilege escalation, and may enable hackers to deploy ransomware/backdoors via remote backup services. Recommendation: Patch impacted systems immediately and investigate to ensure hackers have not already compromised networks.

ConnectWise Recover and R1Soft Risk Overview:

CyberHoot heard from Rapid7 today of active exploitation of CVE-2022-36537 in vulnerable versions of ConnectWise R1Soft Server Backup Manager software. The underlying vulnerability is tied to the ZK Framework. This is an open-source Java framework used for creating web applications. ConnectWise uses ZK Framework in its popular R1Soft and Recovery products. The vulnerability is being used for remote code execution and installation of malicious drivers that may include remote access functionality. Upon successful compromise, attackers have been able to execute commands on all systems running ConnectWise’s backup agent connected to the R1Soft server.

This ConnectWise advisory and NVD entry for CVE-2022-36537 report the flaw as an information disclosure vulnerability. Rapid7 believes this categorization significantly downplays the risk and the impact of CVE-2022-36537. CyberHoot and Rapid7 believe this under-reports the criticality of this risk.  Instead we recommend emergency assessment and patching of your impacted systems. 

Additionally, there are other ZK Framework integrations that will likely come to light in the coming days or weeks.  Please check your environment(s) for any other solutions using the exposed Java ZK framework.

Impacted ConnectWise Systems

  • ConnectWise Recover: Recover v2.9.7 and earlier versions are impacted.

  • R1Soft: SBM v6.16.3 and earlier versions are impacted.

What Should You Do?

Companies should check their inventory of hardware and software assets looking for ZK Framework use.  Patch immediately if you are at risk. 

Review vulnerability scan data for additional exposure.  In all cases, follow your Vulnerability Alert Management Process (VAMP) and patch according to the timelines required. 

For CyberHoot vCISO clients, this is a critical severity issue that should be patched immediately when and where found due to the significant potential for highly impactful compromises of multiple devices and systems.

ConnectWise may have already patched some systems:

According to the ConnectWise advisory, affected ConnectWise Recover SBMs have automatically been updated to the latest version of Recover (v2.9.9). However, for R1Soft, upgrade the server backup manager to SBM v6.16.4 released October 28, 2022 using the R1Soft upgrade wiki from ConnectWise.

Additional ZK Framework Concerns Expected:

ZK Framework is an open source Java framework used to create web applications.  Since we know ConnectWise uses this framework, we know there are patches to apply.  There may be many other Web Applications out there using this Java Framework.  Please assess your web application exposure independent of advisories from CyberHoot, ConnectWise or others to determine other points of risk to your organization.

Shodan Internet Scans and Results for "Server Backup Manager"

Secure your business with CyberHoot Today!!!

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.