PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-36537 ZK Framework CVE debrief

CVE-2022-36537 is a ZK Framework AuUploader vulnerability that CISA added to its Known Exploited Vulnerabilities (KEV) catalog on 2023-02-27. The public record identifies it as an unspecified vulnerability and notes known ransomware campaign use. CISA’s required action is to apply updates per vendor instructions.

Vendor
ZK Framework
Product
AuUploader
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2023-02-27
Original CVE updated
2023-02-27
Advisory published
2023-02-27
Advisory updated
2023-02-27

Who should care

Security, application, and operations teams that run or support ZK Framework deployments using AuUploader should treat this as a priority. Organizations with internet-facing or broadly accessible applications should be especially attentive because CISA lists the issue in KEV and marks it as associated with known ransomware campaign use.

Technical summary

The supplied public sources do not include a technical root-cause description, affected-version list, or exploit mechanics. What is available is that the issue affects ZK Framework’s AuUploader component, is tracked as CVE-2022-36537, and is included in CISA’s KEV catalog as a known exploited vulnerability. The KEV metadata also flags known ransomware campaign use. No CVSS score is provided in the supplied corpus.

Defensive priority

High. KEV inclusion indicates active exploitation risk, and the known ransomware campaign use flag increases urgency. If AuUploader is present anywhere in the environment, remediation should be treated as immediate and verified through inventory and patch confirmation.

Recommended defensive actions

  • Inventory ZK Framework deployments and confirm whether AuUploader is in use.
  • Apply the vendor-recommended updates referenced by CISA and the ZK tracker entry for ZK-5150.
  • Prioritize remediation on internet-facing or externally reachable systems first.
  • Verify remediation by confirming the affected component/version is no longer present.
  • Monitor for unexpected application or file-upload behavior during the remediation window.

Evidence notes

This debrief is based only on the supplied CISA KEV metadata and official vulnerability references. The corpus does not provide exploit code, technical impact details, or a vendor advisory with concrete remediation steps beyond CISA’s instruction to apply updates per vendor instructions. The KEV entry names ZK Framework AuUploader, identifies the issue as known exploited, and notes known ransomware campaign use.

Official resources

Public information in the provided corpus is limited. The issue is documented by CISA as a known exploited vulnerability, but the supplied sources do not include exploit details, affected-version specifics, or a full technical advisory.