ZK Java Framework

Chris Swagler | March 9th, 2023

 

CVE-2022-36537 was added to the United States Cybersecurity & Infrastructure Security Agency (CISA) “Known Exploited Vulnerabilities Catalog” after threat actors began actively exploiting the ZK Java Framework remote code execution (RCE) bug in attacks. CVE-2022-36537 is a very critical (CVSS v3.1: 7.5) weakness that affects ZK Java Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2, and 8.6.4.1, allowing threat operators to obtain private information by sending a specially crafted POST request to the AuUploader component. According to the CISA, ZK Java Framework AuUploader servlets feature an unidentified vulnerability that can allow threat operators to acquire the file’s content contained in the web context. Last year, the flaw was uncovered and ZK rectified it on May 5, 2022, with version 9.6.2. ZK is a Java-based open-source Ajax Web app framework allowing web developers to construct graphical user interfaces for web applications with little effort and programming skills.

The ZK Java Framework Vulnerability

Because the ZK Java Framework is frequently used in projects of all sizes and types, the impact of the flaw is widespread and far-reaching. The managed service provider (MSP) products, including Recover, version 2.9.7 and earlier, and R1SoftServer Backup Manager, version 6.16.3 and earlier, are using the ZK Java Framework. The vulnerability is a common attack vector for malicious cyber threat actors and is a substantial threat to federal agencies. CISA implemented a deadline for federal agencies to March 20, 2023, to install available security updates, allowing the agencies three weeks to respond to the security risk and take appropriate steps to protect their networks.

The ZK Java Framework vulnerability being added to CISA’s Known Exploited Vulnerabilities Catalog came after a cybersecurity company’s IT team published a report detailing how the flaw was actively exploited in attacks. A threat operator used CVE-2022-36537 to obtain initial access to the R1Soft Server Backup Manager software during a recent incident response. The threat operators took control of downstream systems linked through the R1Soft Backup Agent and installed a malicious database driver with backdoor capabilities, allowing them to execute commands on all systems connected to the R1Soft server. Additional investigation was conducted and discovered that global exploitation attempts against R1Soft server software have been ongoing since November 2022, with around 286 servers detected running the backdoor as of January 9, 2023. The ZK Java Framework vulnerability’s exploitation isn’t surprising considering numerous proof-of-concept (PoC) exploits were published in December 2022. Tools for conducting attacks against unpatched R1Soft Server Backup Manager deployments are vastly available which makes it critical for administrators to update to the recent version.

With the most recent vulnerability being exploited by threat operators, it’s critical for companies to always remain vigilant of the current threat landscape and regularly update their data network framework. At SpearTip, our certified engineers are ready to respond to incidents and are continuously working in an investigative cycle at our 24/7/365 Security Operations Center monitoring companies’ data networks for potential cyber threats. With our risk assessments, we designed the assessments for each client to uncover gaps in security and include a technical summary with an individualized risk report detailing necessary steps to remediate the gaps. Our ShadowSpear platform, an integrable solution tool, uses detection engines powered by artificial intelligence (AI) and attack tactics, techniques, and procedures (TTP) models to detect malicious activities.

If your company is experiencing a breach, call our Security Operations Centers at 833.997.7327 to speak directly with an engineer.

Categories

Connect With Us

Featured Articles

Incident Response Planning
Incident Response Planning: Why It's Important
17 May 2024
Ransomware Experiments
Ransomware Experiments on Developing Countries
15 May 2024
Credential Stuffing Attacks
Credential Stuffing Attacks Using TOR: Okta Warning
13 May 2024
Cybersecurity Gap
Close Cybersecurity Gaps through Analysis and Architecture Review
10 May 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.