CVE-2021-37762

9.8 CRITICAL

📋 TL;DR

CVE-2021-37762 is a critical vulnerability in Zoho ManageEngine ADManager Plus that allows attackers to overwrite arbitrary files on the server, leading to remote code execution. This affects all versions up to 7110. Organizations using vulnerable versions are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: All versions up to and including 7110
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of malware or ransomware.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the ADManager Plus application.

🌐 Internet-Facing: HIGH - Directly exploitable over the network without authentication, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally, this vulnerability can be exploited by any network-accessible attacker to gain full control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7111 and later

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7111

Restart Required: Yes

Instructions:

1. Download ADManager Plus version 7111 or later from the ManageEngine website. 2. Stop the ADManager Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to ADManager Plus to only trusted IP addresses or internal networks.

Use firewall rules to limit access (e.g., iptables -A INPUT -p tcp --dport 8383 -s trusted_ip -j ACCEPT on Linux, or Windows Firewall rules)

🧯 If You Can't Patch

  • Immediately isolate the ADManager Plus server from the internet and restrict internal network access to only necessary users.
  • Implement application-level monitoring and file integrity monitoring to detect exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the ADManager Plus version in the web interface under Help > About, or examine the installation directory for version files.

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADManager Plus\conf\version.txt'. On Linux: Check '/opt/ManageEngine/ADManager Plus/conf/version.txt'.

Verify Fix Applied:

Verify the version is 7111 or higher in the web interface or by checking the build number in the installation directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in ADManager Plus logs, unexpected process creation, or authentication bypass attempts.

Network Indicators:

  • Unusual outbound connections from the ADManager Plus server, especially to external IPs or on non-standard ports.

SIEM Query:

Example: 'source="ADManager Plus" AND (event_type="file_write" OR event_type="process_start") AND user="unknown"'

🔗 References

📤 Share & Export