CVE-2022-29081

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access controls on specific REST API endpoints in Zoho ManageEngine products by using '../RestAPI' in URLs. Affected organizations using vulnerable versions of Access Manager Plus, Password Manager Pro, or PAM360 could have their privileged access management systems compromised.

💻 Affected Systems

Products:
  • Zoho ManageEngine Access Manager Plus
  • Zoho ManageEngine Password Manager Pro
  • Zoho ManageEngine PAM360
Versions: Access Manager Plus before 4302, Password Manager Pro before 12007, PAM360 before 5401
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability affects specific REST API endpoints regardless of authentication configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to privileged credentials, session data, and administrative functions, potentially leading to lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive API endpoints allowing attackers to view or modify privileged access data, license information, and system configurations.

🟢

If Mitigated

Limited impact with proper network segmentation and API gateway controls preventing external access to vulnerable endpoints.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication to internet-facing instances.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to authenticated or unauthenticated attackers on the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests with the '../RestAPI' substring. Public proof-of-concept code exists demonstrating the bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Access Manager Plus 4302, Password Manager Pro 12007, PAM360 5401

Vendor Advisory: https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html

Restart Required: Yes

Instructions:

1. Download the latest version from the ManageEngine website. 2. Backup current configuration and data. 3. Stop the ManageEngine service. 4. Install the update following vendor instructions. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Block requests containing '../RestAPI' substring in URLs

WAF rule: deny requests where URI contains '../RestAPI'

Network Segmentation

all

Restrict access to ManageEngine instances to trusted networks only

Firewall rule: allow only specific IP ranges to access ManageEngine ports

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can reach the ManageEngine instances
  • Deploy a web application firewall with rules to block '../RestAPI' patterns in URLs

🔍 How to Verify

Check if Vulnerable:

Check if accessing URLs like https://target/RestAPI/../SSOutAction returns data without proper authentication

Check Version:

Check the product version in the web interface under Help > About or via the product console

Verify Fix Applied:

After patching, verify that the same URLs now return proper authentication errors or are inaccessible

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../RestAPI' in URL path
  • Unauthorized access to SSOutAction, SSLAction, LicenseMgr endpoints

Network Indicators:

  • HTTP GET/POST requests to vulnerable endpoints without authentication headers
  • Unusual traffic patterns to REST API endpoints

SIEM Query:

source="manageengine" AND (url="*../RestAPI*" OR endpoint IN ("SSOutAction", "SSLAction", "LicenseMgr", "GetProductDetails", "GetDashboard", "FetchEvents", "Synchronize"))

🔗 References

📤 Share & Export