CVE-2021-42002

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass security filters and upload malicious files to Zoho ManageEngine ADManager Plus servers, leading to remote code execution. Organizations using ADManager Plus versions before 7115 are affected. Attackers can potentially take full control of affected systems.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: All versions before 7115
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments regardless of configuration. ADManager Plus typically runs with high privileges for Active Directory management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive Active Directory data, pivot to other network resources, and establish persistent access.

🟠

Likely Case

Attackers upload web shells or malware to gain initial access, then escalate privileges to compromise Active Directory environments and deploy ransomware or exfiltrate credentials.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the ADManager Plus server itself, though Active Directory integration still poses significant risk.

🌐 Internet-Facing: HIGH - File upload vulnerabilities on internet-facing systems are easily exploitable and can lead to immediate compromise.
🏢 Internal Only: HIGH - Even internally, this vulnerability allows authenticated or unauthenticated attackers to gain foothold in critical AD management infrastructure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Filter bypass vulnerabilities are typically easy to exploit. ManageEngine products are frequently targeted by threat actors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7115

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7115

Restart Required: Yes

Instructions:

1. Download ADManager Plus version 7115 or later from ManageEngine website. 2. Backup current installation and configuration. 3. Run the installer to upgrade. 4. Restart the ADManager Plus service.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to ADManager Plus server to only necessary administrative IPs

Use firewall rules to block all inbound traffic except from authorized management networks

File Upload Restrictions

all

Implement web application firewall rules to block suspicious file upload patterns

WAF rule: deny requests with file uploads containing executable content or suspicious extensions

🧯 If You Can't Patch

  • Immediately isolate the ADManager Plus server from the network and restrict access to essential personnel only
  • Implement strict monitoring for file upload activities and unusual process execution on the server

🔍 How to Verify

Check if Vulnerable:

Check ADManager Plus version in web interface or installation directory. Versions below 7115 are vulnerable.

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADManager Plus\conf\version.txt' or web interface -> Help -> About

Verify Fix Applied:

Confirm version is 7115 or higher in the web interface and verify no unauthorized files exist in upload directories.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to ADManager Plus
  • Execution of unexpected processes from web directories
  • Authentication attempts from unusual locations

Network Indicators:

  • HTTP POST requests with file uploads to ADManager Plus endpoints
  • Outbound connections from ADManager Plus server to unknown IPs

SIEM Query:

source="ADManager Plus" AND (event="File Upload" OR event="Process Execution") AND result="success"

🔗 References

📤 Share & Export