A security expert has disclosed details about a zero-day vulnerability in a Zoho enterprise product via Twitter, a circumstance that could cause serious problems to customers of the company.
The flaw affects Zoho ManageEngine Desktop Central endpoint management solution that helps organizations in managing servers, laptops, desktops, smartphones, and tablets from a central location.
“This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine Desktop Central. Authentication is not required to exploit this vulnerability.” read the advisory published by the expert.
“The specific flaw exists within the FileStorage class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.”
The vulnerability resides in the FileStorage class, it is caused by the lack of proper validation of user-supplied data. The attackers can exploit the vulnerability to execute code under the context of SYSTEM and take full control of the vulnerable ManageEngine systems,
The zero-day could be used by threat actors to target organizations and managed service providers (MSPs) using Zoho ManageEngine to deliver malware, especially ransomware.
Searching for exposed Zoho ManageEngine systems online using Shodan we can find over 2300 installs.
Experts also warn that Zoho ManageEngine systems that are not exposed online could be targeted by threat actors once compromised the hosting network. Then attackers can exploit the issue to deliver malware to all the systems on the company’s network.
Experts believe that the availability of a PoC exploit code for the vulnerability will trigger a new wave of attacks targeting the Zoho ManageEngine systems.
At the time there is no fix for the flaw, the company declared that it was not informed by Seeley about the issue and is currently working on a patch. On the other site, Seeley claimed on Twitter that Zoho usually ignored researchers.
The remote code execution vulnerability in Desktop Central (CVE-2020-10189) has been fixed in build 10.0.479, available at https://manageengine.com/products/desktop-central/service-packs.html…. For more information about the vulnerability, please visit https://t.co/uJedc7dexl
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.