CVE-2021-42954
📋 TL;DR
This vulnerability allows non-admin users on Windows systems to modify files in Zoho Remote Access Plus installation directory due to overly permissive file permissions. Attackers can escalate privileges, reset passwords, access sensitive data including plaintext credentials, and tamper with configuration files. Affects organizations using Zoho Remote Access Plus Server Windows Desktop Binary.
💻 Affected Systems
- Zoho Remote Access Plus Server Windows Desktop Binary
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through privilege escalation, credential theft, and persistent backdoor installation via configuration tampering.
Likely Case
Unauthorized access to sensitive data including passwords, configuration files, and registry values leading to lateral movement within the network.
If Mitigated
Limited impact with proper file permissions and access controls preventing unauthorized file modifications.
🎯 Exploit Status
Exploitation requires local access but uses simple file permission manipulation techniques that are well-documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.1.2121.1 and later
Vendor Advisory: https://help.zoho.com/portal/en/kb/remote-access-plus/articles/security-advisory-for-cve-2021-42954
Restart Required: Yes
Instructions:
1. Download and install Zoho Remote Access Plus version 10.1.2121.1 or later from official Zoho website. 2. Run the installer with administrative privileges. 3. Restart the Remote Access Plus service after installation completes.
🔧 Temporary Workarounds
Restrict Installation Directory Permissions
windowsManually adjust file permissions to remove Everyone group access and restrict to authorized users only.
icacls "C:\Program Files\Zoho\RemoteAccessPlus" /remove:g "Everyone"
icacls "C:\Program Files\Zoho\RemoteAccessPlus" /grant:r "Administrators:(OI)(CI)F" "SYSTEM:(OI)(CI)F"
🧯 If You Can't Patch
- Implement strict access controls and monitor for unauthorized file modifications in the installation directory
- Isolate affected systems from critical network segments and implement application whitelisting
🔍 How to Verify
Check if Vulnerable:
Check file permissions on Zoho Remote Access Plus installation directory using: icacls "C:\Program Files\Zoho\RemoteAccessPlus"
Check Version:
Check version in Control Panel > Programs and Features or examine the application's about dialog
Verify Fix Applied:
Verify Everyone group does not have Full Control permissions and version is 10.1.2121.1 or later
📡 Detection & Monitoring
Log Indicators:
- Windows Security Event ID 4663 (File system access) showing unauthorized users accessing Zoho installation directory
- Application logs showing unexpected configuration changes or service restarts
Network Indicators:
- Unusual authentication attempts from previously unused accounts
- Unexpected outbound connections from the Remote Access Plus server
SIEM Query:
EventID=4663 AND ObjectName LIKE "%Zoho%RemoteAccessPlus%" AND Accesses="WriteData" AND SubjectUserName NOT IN ("SYSTEM", "Administrator")