CVE-2021-37423
📋 TL;DR
This vulnerability allows attackers to take over linked applications in Zoho ManageEngine ADSelfService Plus. Attackers can potentially gain unauthorized access to integrated systems and perform malicious actions. Organizations using ADSelfService Plus version 6111 and earlier are affected.
💻 Affected Systems
- Zoho ManageEngine ADSelfService Plus
📦 What is this software?
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
Manageengine Adselfservice Plus by Zohocorp
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of linked applications, potentially leading to domain takeover, data exfiltration, and lateral movement across the network.
Likely Case
Unauthorized access to integrated systems, credential theft, and privilege escalation within the ADSelfService Plus environment.
If Mitigated
Limited impact with proper network segmentation, application isolation, and monitoring in place.
🎯 Exploit Status
The vulnerability allows takeover of linked applications, suggesting relatively straightforward exploitation once discovered.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6112 hotfix
Vendor Advisory: https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release
Restart Required: Yes
Instructions:
1. Download the 6112 hotfix from the ManageEngine portal. 2. Stop the ADSelfService Plus service. 3. Apply the hotfix. 4. Restart the service. 5. Verify the version shows 6112.
🔧 Temporary Workarounds
Disable Linked Applications
allTemporarily disable all linked application integrations to prevent exploitation.
Navigate to Admin → Linked Applications → Disable all integrations
Network Isolation
allRestrict network access to ADSelfService Plus to only necessary systems.
Configure firewall rules to limit inbound/outbound connections
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ADSelfService Plus from critical systems
- Enable enhanced logging and monitoring for suspicious activity in linked applications
🔍 How to Verify
Check if Vulnerable:
Check the ADSelfService Plus version in the web interface under Help → About. If version is 6111 or earlier, the system is vulnerable.
Check Version:
Check web interface at https://[server]:[port]/help/about.jsp or examine installation directory version files
Verify Fix Applied:
After applying the 6112 hotfix, verify the version shows 6112 in the About section and test linked application functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual linked application access patterns
- Failed authentication attempts followed by successful linked app access
- Configuration changes to linked applications
Network Indicators:
- Unexpected outbound connections from ADSelfService Plus to linked systems
- Unusual authentication traffic patterns
SIEM Query:
source="ADSelfServicePlus" AND (event="LinkedAppAccess" OR event="ConfigurationChange") | stats count by user, src_ip, dest_ip