CVE-2021-37925

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands on Zoho ManageEngine ADManager Plus servers. Attackers with valid credentials can gain full control of affected systems. Organizations using ADManager Plus version 7110 or earlier are affected.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: 7110 and prior versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ADManager Plus web interface. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Privilege escalation leading to unauthorized access to Active Directory, credential theft, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact if network segmentation, least privilege access, and command execution restrictions are properly implemented.

🌐 Internet-Facing: HIGH if exposed to internet, as authenticated attackers can gain full system control remotely.
🏢 Internal Only: HIGH as authenticated internal users or compromised accounts can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Post-authentication exploitation with publicly available proof-of-concept code. Attackers need valid credentials to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7111 and later

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7111

Restart Required: Yes

Instructions:

1. Download ADManager Plus version 7111 or later from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the ADManager Plus service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to ADManager Plus web interface to only trusted administrative networks.

Least Privilege Access

all

Review and restrict user accounts with access to ADManager Plus to only necessary personnel.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the ADManager Plus interface
  • Enable detailed logging and monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check ADManager Plus version in web interface under Help > About or via installed directory version files.

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADManager Plus\conf\version.txt'. On Linux: Check '/opt/ManageEngine/ADManager Plus/conf/version.txt'

Verify Fix Applied:

Verify version is 7111 or later and test that command injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • Suspicious process creation from ADManager Plus service account

Network Indicators:

  • Unusual outbound connections from ADManager Plus server
  • Traffic to unexpected ports or IP addresses

SIEM Query:

source="ADManager Plus" AND (event="command execution" OR event="process creation") AND user!="expected_admin_user"

🔗 References

📤 Share & Export