CVE-2020-24786

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authentication in multiple Zoho ManageEngine products via a Java servlet. Attackers can modify system integration properties, potentially leading to full compromise of the ManageEngine suite. Organizations using affected versions of the listed ManageEngine products are at risk.

💻 Affected Systems

Products:
  • Zoho ManageEngine Exchange Reporter Plus
  • AD360
  • ADSelfService Plus
  • DataSecurity Plus
  • RecoverManager Plus
  • EventLog Analyzer
  • ADAudit Plus
  • O365 Manager Plus
  • Cloud Security Plus
  • ADManager Plus
  • Log360
Versions: All versions before build numbers: Exchange Reporter Plus 5510, AD360 4228, ADSelfService Plus 5817, DataSecurity Plus 6033, RecoverManager Plus 6017, EventLog Analyzer 12136, ADAudit Plus 6052, O365 Manager Plus 4334, Cloud Security Plus 4110, ADManager Plus 7055, Log360 5166
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the Java servlet com.manageengine.ads.fw.servlet.UpdateProductDetails, which is remotely accessible by default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the ManageEngine suite, allowing attackers to gain administrative access, modify configurations, access sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Unauthenticated attackers gain administrative privileges to affected ManageEngine products, enabling configuration changes, data exfiltration, and further system compromise.

🟢

If Mitigated

If properly patched or network-restricted, the vulnerability is eliminated; with workarounds, risk is reduced but not fully mitigated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the vulnerable servlet; public details and proof-of-concept are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build numbers: Exchange Reporter Plus 5510, AD360 4228, ADSelfService Plus 5817, DataSecurity Plus 6033, RecoverManager Plus 6017, EventLog Analyzer 12136, ADAudit Plus 6052, O365 Manager Plus 4334, Cloud Security Plus 4110, ADManager Plus 7055, Log360 5166

Vendor Advisory: https://pitstop.manageengine.com/portal/en/community/topic/how-to-fix-the-unauthenticated-product-integration-vulnerability

Restart Required: Yes

Instructions:

1. Download and install the latest build for your specific ManageEngine product from the official Zoho website. 2. Apply the patch according to vendor instructions. 3. Restart the ManageEngine service to ensure changes take effect.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the ManageEngine products to trusted IP addresses only, blocking external and unauthorized internal access.

Use firewall rules (e.g., iptables on Linux or Windows Firewall) to allow only specific IPs to access the ManageEngine service ports.

Servlet Disablement

all

Disable or block access to the vulnerable Java servlet com.manageengine.ads.fw.servlet.UpdateProductDetails if possible in your configuration.

Modify web.xml or application configuration to restrict access to the servlet; consult product documentation for specific steps.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ManageEngine products from untrusted networks.
  • Monitor logs and network traffic for unauthorized access attempts to the vulnerable servlet.

🔍 How to Verify

Check if Vulnerable:

Check the build number of your ManageEngine product via the web interface or configuration files and compare with patched versions listed above.

Check Version:

Check the product's web interface under 'About' or 'Help' sections, or examine configuration files for version details.

Verify Fix Applied:

After patching, verify the build number has been updated to the patched version and test that the servlet no longer allows unauthenticated access.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP requests to /servlet/UpdateProductDetails or similar paths
  • Unusual configuration changes or administrative actions from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to the vulnerable servlet endpoint from unauthorized sources

SIEM Query:

Example: source_ip NOT IN trusted_ips AND uri_path CONTAINS 'UpdateProductDetails' AND http_method = 'POST'

🔗 References

📤 Share & Export