A new severe security vulnerability in IT service management software platform ConnectWise has been reported. The vulnerability affects the company’s Recover and R1Soft Server Backup Manager (SBM).
The vulnerability has been described as “Improper Neutralization of Special Elements in Output Used by a Downstream Component,” and affects the following product versions:
- ConnectWise Recover: Recover v2.9.7 and earlier versions are impacted.
- R1Soft: SBM v6.16.3 and earlier versions are impacted.
The vulnerability is associated with another upstream authentication bypass issue in the
ZK open source Ajax web application framework, known as CVE-2022-36537, which was addressed in May 2022.
Cybersecurity firm Huntress has created a Proof-of-Concept exploit, thus demonstrating its impact and severity. If exploited, the vulnerability can lead to:
- Bypass authentication;
- Uploading a backdoored JDBC database driver to perform code execution attacks;
- Using the REST API to trigger commands to registered agents to push Lockbit 3.0 ransomware to all downstream endpoints.
“We have worked closely with ConnectWise to advise them of these issues and they have released a patch for Server Backup Manager SE software. Huntress has validated their patch and confirms it is effective against stopping our own proof-of-concept (POC) exploit,” the researchers noted.
How Can the ConnectWise Vulnerability Be Remediated?
Affected ConnectWise Recover SBMs have automatically been updated to the latest version of Recover (v2.9.9), the company noted. As for R1Soft, affected parties should upgrade the server backup manager to SBM v6.16.4 released October 28, 2022 using the R1Soft upgrade wiki.