CVE-2021-31160

7.5 HIGH

📋 TL;DR

This vulnerability in Zoho ManageEngine ServiceDesk Plus MSP allows attackers to access internal data without proper authentication. It affects organizations using ServiceDesk Plus MSP for IT service management. The vulnerability enables unauthorized access to sensitive information stored within the application.

💻 Affected Systems

Products:
  • Zoho ManageEngine ServiceDesk Plus MSP
Versions: All versions before 10521
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of ServiceDesk Plus MSP regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal organizational data including customer information, service tickets, configuration data, and potentially credentials.

🟠

Likely Case

Unauthorized access to sensitive service desk data, potentially exposing customer information, internal communications, and operational details.

🟢

If Mitigated

Limited data exposure with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH - If the application is exposed to the internet, attackers can directly exploit this vulnerability.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows access to internal data without authentication, suggesting relatively simple exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10521

Vendor Advisory: https://www.manageengine.com/products/service-desk-msp/readme.html#10521

Restart Required: Yes

Instructions:

1. Download ServiceDesk Plus MSP version 10521 or later from ManageEngine website. 2. Backup current installation and data. 3. Run the installer to upgrade to version 10521. 4. Restart the ServiceDesk Plus MSP service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ServiceDesk Plus MSP to only trusted internal networks.

Access Control Lists

all

Implement firewall rules to limit access to the application from specific IP ranges only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the ServiceDesk Plus MSP instance
  • Deploy web application firewall (WAF) with rules to detect and block unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check the ServiceDesk Plus MSP version in the application interface or installation directory. Versions below 10521 are vulnerable.

Check Version:

Check the version in the application web interface under Help > About, or examine the installation directory for version files.

Verify Fix Applied:

Verify the application version shows 10521 or higher after patching and test that unauthorized data access is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to internal data endpoints
  • Requests to sensitive data without authentication
  • Access from unexpected IP addresses

Network Indicators:

  • Unusual HTTP requests to internal API endpoints
  • Data exfiltration patterns from the application

SIEM Query:

source="servicedesk-msp" AND (url_path="/internal/*" OR status=200) AND user="anonymous"

🔗 References

📤 Share & Export