CVE-2022-24978
📋 TL;DR
This vulnerability in Zoho ManageEngine ADAudit Plus allows authenticated users to escalate privileges on integrated products by extracting passwords from JSON responses. It affects organizations using ManageEngine ADAudit Plus for Active Directory auditing and management.
💻 Affected Systems
- Zoho ManageEngine ADAudit Plus
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers with authenticated access can gain administrative privileges across integrated ManageEngine products, potentially compromising Active Directory environments and sensitive audit data.
Likely Case
Malicious insiders or attackers who have obtained valid credentials can escalate privileges to access restricted functionality and sensitive information.
If Mitigated
With proper network segmentation and least privilege access, impact is limited to the specific ADAudit Plus instance and integrated products.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7055 and later
Vendor Advisory: https://pitstop.manageengine.com/portal/en/community/topic/cve-2022-24978-privilege-escalation-vulnerability-manageengine-adaudit-plus
Restart Required: Yes
Instructions:
1. Download ManageEngine ADAudit Plus version 7055 or later from the official website. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to ADAudit Plus management interface to authorized users only.
Access Control
allImplement strict authentication controls and monitor for unusual privilege escalation attempts.
🧯 If You Can't Patch
- Implement network segmentation to isolate ADAudit Plus from critical systems
- Enforce strict access controls and monitor for privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check the ADAudit Plus version in the web interface under Help > About. If version is below 7055, the system is vulnerable.
Check Version:
Check web interface at https://[server]:[port]/api/version or via Help > About in GUI
Verify Fix Applied:
After patching, verify version is 7055 or higher and test that password fields are no longer exposed in JSON responses.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation attempts
- Multiple failed authentication attempts followed by successful login
- Access to sensitive API endpoints
Network Indicators:
- Unusual API calls to ADAudit Plus endpoints
- Traffic patterns indicating privilege escalation attempts
SIEM Query:
source="adaudit_plus" AND (event_type="privilege_escalation" OR api_endpoint="*/password*" OR status="success" AND user_role_changed="true")
🔗 References
- https://manageengine.com
- https://pitstop.manageengine.com/portal/en/community/topic/cve-2022-24978-privilege-escalation-vulnerability-manageengine-adaudit-plus
- https://manageengine.com
- https://pitstop.manageengine.com/portal/en/community/topic/cve-2022-24978-privilege-escalation-vulnerability-manageengine-adaudit-plus