Zoho Patches Actively Exploited Critical ADSelfService Plus Bug

Zoho Patches Actively Exploited Critical ADSelfService Plus Bug

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are exploiting a critical vulnerability in Zoho’s ManageEngine ADSelfService Plus password management solution that allows them to take control of the system.

ADSelfService Plus is aimed at larger organizations that need an integrated self-service password management for and single sign-on solution for Active Directory and cloud apps.

Also Read: Trusted Data Sharing Framework IMDA Announced In Singapore

Exploits detected in the wild

The security issue is identified as CVE-2021-40539. It is considered critical as it can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Zoho has published a security advisory to announce that an update that patches the bug is currently available for ADSelfService Plus.

In a security notification week, the company says that it is “noticing indications of this vulnerability being exploited” in the wild.

The alert from CISA is clear about this, though, as the agency informs that “CVE-2021-40539 has been detected in exploits in the wild.”

At this moment, information about the vulnerability is scarce. A severity score has not been calculated by the National Institute of Standards and Technology in the U.S. but Zoho notes that the issue is critical:

“An authentication bypass vulnerability affecting REST API URLs, that could result in remote code execution,” the company says.

Organizations with ADSelfService Plus builds lower than 6114 are urged to apply the latest update from the developer, available using the service pack.

Also Read: PDPA Breach Penalty Singapore: How Can Businesses Prevent

CVE-2021-40539 is the fifth critical vulnerability reported for Zoho ManageEngine ADSelfService Plus this year:

  • CVE-2021-37421 – admin portal access-restriction bypass in Zoho ManageEngine ADSelfService Plus 6103 and earlier
  • CVE-2021-37417 – CAPTCHA bypass due to improper parameter validation in Zoho ManageEngine ADSelfService Plus build 6103 and earlier
  • CVE-2021-33055 – unauthenticated remote code execution in non-English editions affecting Zoho ManageEngine ADSelfService Plus through 6102
  • CVE-2021-28958 – unauthenticated remote code execution while changing the password in all Zoho ManageEngine ADSelfService Plus builds up to 6101

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

2 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

2 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

3 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

3 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

1 month ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago