CVE-2021-42099

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload malicious files to Zoho ManageEngine M365 Manager Plus servers, leading to remote code execution. It affects all organizations running vulnerable versions of this software. Attackers can gain complete control over affected systems.

💻 Affected Systems

Products:
  • Zoho ManageEngine M365 Manager Plus
Versions: All versions before 4421
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux installations. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, deploy ransomware, and pivot to other network resources.

🟠

Likely Case

Attackers gain administrative access to the ManageEngine server, potentially accessing Microsoft 365 management data and credentials stored in the system.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to the ManageEngine server itself without lateral movement.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to attackers who gain network access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and has been observed in the wild. Multiple proof-of-concept exploits are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4421

Vendor Advisory: https://www.manageengine.com/microsoft-365-management-reporting/release-notes.html#4421

Restart Required: Yes

Instructions:

1. Download version 4421 or later from ManageEngine website. 2. Stop the M365 Manager Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to M365 Manager Plus to only trusted IP addresses

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 8443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 8443 -j DROP

File Upload Restriction

all

Configure web server to block file uploads to vulnerable endpoints

Modify web.xml or application configuration to restrict upload functionality

🧯 If You Can't Patch

  • Isolate the M365 Manager Plus server in a separate network segment with strict firewall rules
  • Implement web application firewall (WAF) rules to block file upload requests to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check the version number in the web interface or installation directory. Versions below 4421 are vulnerable.

Check Version:

Check the version.txt file in the installation directory or view the version in the web interface login page.

Verify Fix Applied:

Verify version is 4421 or higher in the web interface or by checking the installation directory version files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in web server logs
  • POST requests to file upload endpoints with suspicious file extensions
  • New process execution from web server context

Network Indicators:

  • HTTP POST requests to /api/v1/upload or similar endpoints with executable file uploads
  • Outbound connections from M365 Manager Plus server to suspicious IPs

SIEM Query:

source="M365ManagerPlus" AND (url="*upload*" OR method="POST") AND (file_extension="jsp" OR file_extension="war" OR file_extension="exe")

🔗 References

📤 Share & Export