CVE-2022-35403

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to read local files on Zoho ManageEngine servers via specially crafted ticket-creation emails. It affects ServiceDesk Plus, ServiceDesk Plus MSP, SupportCenter Plus, and Asset Explorer products. Attackers can access sensitive files without credentials in most affected products.

💻 Affected Systems

Products:
  • Zoho ManageEngine ServiceDesk Plus
  • Zoho ManageEngine ServiceDesk Plus MSP
  • Zoho ManageEngine SupportCenter Plus
  • Zoho ManageEngine Asset Explorer
Versions: ServiceDesk Plus before 13008, ServiceDesk Plus MSP before 10606, SupportCenter Plus before 11022, Asset Explorer before 6977
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Asset Explorer requires authentication while other products allow unauthenticated exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through disclosure of configuration files, passwords, or other sensitive data leading to privilege escalation or lateral movement.

🟠

Likely Case

Unauthorized access to sensitive files containing credentials, configuration data, or business information.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to access files without credentials.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but authentication is required for Asset Explorer.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves sending specially crafted emails to trigger file disclosure. No public exploit code is confirmed, but the vulnerability is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ServiceDesk Plus 13008+, ServiceDesk Plus MSP 10606+, SupportCenter Plus 11022+, Asset Explorer 6977+

Vendor Advisory: https://www.manageengine.com/products/service-desk/cve-2022-35403.html

Restart Required: Yes

Instructions:

1. Download the latest version from the ManageEngine website. 2. Backup your current installation. 3. Run the installer/upgrade package. 4. Restart the service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable email-based ticket creation

all

Temporarily disable the email parsing functionality that processes ticket-creation emails.

Restrict email access

all

Configure email server to only accept emails from trusted sources for ticket creation.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ManageEngine servers from untrusted networks.
  • Apply file system permissions to restrict access to sensitive files and directories.

🔍 How to Verify

Check if Vulnerable:

Check the product version in the web interface under Help > About or via the server console.

Check Version:

Check the web interface or consult the product documentation for version checking commands specific to your installation.

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the fix section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual email processing activity
  • File access patterns from email parsing components
  • Error logs related to file path traversal

Network Indicators:

  • Unusual email traffic to the ManageEngine server
  • Outbound data transfers following email receipt

SIEM Query:

source="manageengine*" AND (event="email_processing" OR event="file_access") AND (path=".." OR path="../")

🔗 References

📤 Share & Export