CVE-2022-28219

9.8 CRITICAL

📋 TL;DR

CVE-2022-28219 is an unauthenticated XML External Entity (XXE) vulnerability in Cewolf within Zoho ManageEngine ADAudit Plus that allows remote attackers to execute arbitrary code on affected systems. Organizations running ManageEngine ADAudit Plus versions before 7060 are affected. This vulnerability enables complete system compromise without requiring authentication.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADAudit Plus
Versions: All versions before 7060
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Cewolf component is vulnerable by default in affected versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to installation of backdoors, credential theft, and persistence mechanisms on the affected server.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and input validation are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to directly compromise exposed systems.
🏢 Internal Only: HIGH - Even internally accessible systems are vulnerable to unauthenticated attacks from compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm and other sources. Attack requires no authentication and minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7060 and later

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html

Restart Required: Yes

Instructions:

1. Download ManageEngine ADAudit Plus build 7060 or later from official vendor site. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to ADAudit Plus web interface using firewall rules

Web Application Firewall

all

Deploy WAF with XXE protection rules to block malicious XML payloads

🧯 If You Can't Patch

  • Isolate the ADAudit Plus server in a restricted network segment with no internet access
  • Implement strict network monitoring and alerting for suspicious XML requests to the ADAudit Plus web interface

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface admin panel or installation directory

Check Version:

Check web interface at https://[server]:[port]/api/version or examine installation directory version files

Verify Fix Applied:

Verify version is 7060 or higher and test with XXE payloads to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML POST requests to ADAudit Plus endpoints
  • System command execution logs from ADAudit Plus process
  • Outbound connections from ADAudit Plus server to unknown IPs

Network Indicators:

  • XML payloads containing external entity references sent to ADAudit Plus ports
  • Unexpected outbound connections from ADAudit Plus server

SIEM Query:

source="ADAudit Plus" AND (http_method="POST" AND uri_path="*cewolf*" AND request_body="*<!ENTITY*" OR process_execution="cmd.exe" OR process_execution="powershell.exe")

🔗 References

📤 Share & Export