CVE-2021-33911

9.8 CRITICAL

📋 TL;DR

This vulnerability in Zoho ManageEngine ADManager Plus allows remote attackers to execute arbitrary code on affected systems. It affects organizations using ADManager Plus for Active Directory management before version 7110. The high CVSS score indicates critical severity requiring immediate attention.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: All versions before 7110
Operating Systems: Windows Server (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of ADManager Plus before the patched version, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, steal credentials, pivot to other systems, and maintain persistent access to the network.

🟠

Likely Case

Attacker gains control of the ADManager Plus server, potentially compromising Active Directory management capabilities and accessing sensitive directory information.

🟢

If Mitigated

Limited impact with proper network segmentation, but still requires patching to eliminate the vulnerability.

🌐 Internet-Facing: HIGH - Remote code execution vulnerability that can be exploited without authentication makes internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, this RCE vulnerability poses significant risk as it could be exploited by internal threats or attackers who have gained initial foothold.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote code execution vulnerabilities in ManageEngine products are frequently exploited in the wild. The high CVSS score and unauthenticated nature make this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7110

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7110

Restart Required: Yes

Instructions:

1. Download ADManager Plus build 7110 from ManageEngine website. 2. Backup current installation and configuration. 3. Run the installer to upgrade to version 7110. 4. Restart the ADManager Plus service. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to ADManager Plus to only trusted IP addresses and networks

Use firewall rules to limit access: netsh advfirewall firewall add rule name="Restrict ADManager" dir=in action=allow remoteip=192.168.1.0/24,10.0.0.0/8 localport=8383 protocol=tcp

Application Layer Filtering

all

Implement WAF rules to block suspicious requests to ADManager Plus endpoints

🧯 If You Can't Patch

  • Isolate the ADManager Plus server in a separate network segment with strict access controls
  • Implement additional monitoring and alerting for suspicious activity on the ADManager Plus server

🔍 How to Verify

Check if Vulnerable:

Check the ADManager Plus version in the web interface under Help > About, or examine the installation directory for version information.

Check Version:

Check web interface at https://[server]:8383 or examine %PROGRAMFILES%\ManageEngine\ADManager Plus\conf\version.txt on Windows

Verify Fix Applied:

Verify version shows 7110 or higher in the web interface, and check that the vulnerability scanning tools no longer detect the CVE.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from ADManager Plus service
  • Suspicious network connections originating from ADManager Plus server
  • Unexpected file modifications in ADManager Plus directories

Network Indicators:

  • Unusual outbound connections from ADManager Plus server
  • Exploit traffic patterns to ADManager Plus web ports (typically 8383)

SIEM Query:

source="ADManager_Plus_Logs" AND (event_type="Process_Creation" AND parent_process="ADManagerService.exe") OR (http_request LIKE "%exploit_pattern%")

🔗 References

📤 Share & Export