Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
In early December 2021, CISA reported that an APT group was exploiting two vulnerabilities in Zoho’s ManageEngine ServiceDesk Plus, as well as their Desktop Central and Desktop Central MSP. Zoho is an enterprise software provider who specializes in IT help desk software with asset management.
CVE-2021-44515 is an authentication bypass vulnerability that affects ManageEngine Desktop Central MSP. This vulnerability could allow an attacker to bypass authentication protections and execute arbitrary code in the Desktop Central MSP server. Attackers would then be able to gain unauthorized access by sending a crafted request that leads to remote code execution. Customers are advised to upgrade to builds 11149, 11212, 11311, or 12003.
Vulnerability CVE-2021-44077 affects ManageEngine ServiceDesk Plus and includes an authentication bypass issue which can allow attackers to upload executable files and place webshells. The webshells enable the attacker to conduct post-exploitation activities (lateral movement, exfiltrating registry hives and Active Directory files, stealing administrator credentials, etc.).
The Zoho update released on September 16, 2021, attempted to patch CVE-2021-44077, but it was not successful. Zoho released another patch that fixes the issue and instructions for patching can be found on their website. The vulnerability affects versions 11305 and earlier, and malicious actors have been using it to gain access to ManageEngine ServiceDesk Plus since late October 2021. Over the past three months, at least 13 undisclosed organizations across the energy, healthcare, education, and technology industries have been compromised by this APT threat actor. There are over 4,700 global internet facing instances of ServiceDesk Plus, of which 2,900 (62%) are assessed to be vulnerable to exploitation. Currently, the threat actors have been seen using the following tactics, techniques, and procedures:
According to CISA and the FBI, the source of the CVE-2021-44077 is an improper security configuration process used in the application. It allows attackers to gain unauthorized access to ServiceDesk Plus data through some of its application URLs. The URL bypasses the authentication process and fetches required data, delivering it to an attacker who then gains unauthorized access or carries out another attack.
Palo Alto Networks stated that the observed recent activity is tied to a persistent APT threat actor that initially used a zero-day vulnerability in ManageEngine ADSelfService in August and September 2021. The threat actor then changed their method of attack and decided to exploit CVE-2021-44077 and is now leveraging the vulnerability in the ServiceDesk Plus and Desktop Central software. Zoho has classified the severity of this vulnerability as “severe” and has issued a patch. They have also developed an Exploit Detection Tool for CVE-2021-44515 that can help identify if an installation has been affected by the vulnerability. You can go here to download ManageEngine's Exploit Detection Tool.
Due to the vulnerabilities happening consecutively, it is now recommended that all Zoho software be patched. These vulnerabilities follow the recent pattern of supply-chain compromise, like with the attacks on Kaseya and SolarWinds. These attacks should remind organizations of how important it is to keep track of what kind of remote management tools are in an environment and keep them up to date.
After downloading follow these steps:
CVE-2021-44077
CVE-2021-44515
APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus | CISA
APT Conducts Active Campaign Against ManageEngine ServiceDesk Plus (paloaltonetworks.com)
Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks (thehackernews.com)
Critical flaw in ManageEngine Desktop Central MSP tool exploited in the wild | CSO Online
Authentication Bypass using Filter Configuration | ManageEngine
Related Reading:
Contact us for more information about Avertium’s managed security service capabilities.