CVE-2021-41828

7.5 HIGH

📋 TL;DR

Zoho ManageEngine Remote Access Plus versions before 10.1.2121.1 contain hardcoded credentials in resetPWD.xml, allowing attackers to bypass authentication and gain unauthorized access. This affects all organizations using vulnerable versions of the Remote Access Plus software for remote desktop management.

💻 Affected Systems

Products:
  • Zoho ManageEngine Remote Access Plus
Versions: All versions before 10.1.2121.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations are vulnerable regardless of configuration due to hardcoded credentials in the resetPWD.xml file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ManageEngine Remote Access Plus system, allowing attackers to execute arbitrary commands, access sensitive systems managed through the platform, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to the Remote Access Plus administrative interface, enabling attackers to view/manage connected systems, steal credentials, and deploy malware to managed endpoints.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though the hardcoded credentials still represent a significant authentication bypass vulnerability.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable without authentication, allowing immediate compromise.
🏢 Internal Only: HIGH - Even internally hosted instances are vulnerable to internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - attackers can use the hardcoded credentials directly without any special tools or techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.2121.1 and later

Vendor Advisory: https://www.manageengine.com/remote-desktop-management/hotfix-readme.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the Remote Access Plus service. 5. Verify the version is 10.1.2121.1 or later.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the Remote Access Plus web interface to trusted IP addresses only

File Removal (Temporary)

all

Remove or rename the vulnerable resetPWD.xml file as a temporary measure

mv /path/to/resetPWD.xml /path/to/resetPWD.xml.bak
del C:\path\to\resetPWD.xml

🧯 If You Can't Patch

  • Isolate the Remote Access Plus server from the internet and restrict internal access to only necessary users
  • Implement additional authentication layers such as VPN or reverse proxy with strong authentication

🔍 How to Verify

Check if Vulnerable:

Check if the file resetPWD.xml exists in the installation directory and contains hardcoded credentials

Check Version:

Check the version in the web interface under Help > About, or examine the build version in installation directory

Verify Fix Applied:

Verify the version is 10.1.2121.1 or later and that resetPWD.xml no longer contains hardcoded credentials

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login using hardcoded credentials
  • Unusual administrative actions from unexpected IP addresses

Network Indicators:

  • HTTP requests to resetPWD.xml endpoint from unauthorized sources
  • Unusual outbound connections from the Remote Access Plus server

SIEM Query:

source="manageengine" AND (event="authentication" AND result="success" AND user="hardcoded_user") OR (url="/resetPWD.xml")

🔗 References

📤 Share & Export