CVE-2022-36413

9.1 CRITICAL

📋 TL;DR

This vulnerability in Zoho ManageEngine ADSelfService Plus allows attackers to perform brute-force attacks against password reset functionality for IDM applications. Successful exploitation could lead to unauthorized password resets and account takeover. Organizations using ADSelfService Plus versions through 6203 are affected.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADSelfService Plus
Versions: All versions through 6203
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the IDM (Identity Manager) integration functionality within ADSelfService Plus.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reset passwords for privileged accounts, gain domain administrator access, and completely compromise the Active Directory environment.

🟠

Likely Case

Attackers reset passwords for standard user accounts, gaining unauthorized access to corporate resources and potentially escalating privileges.

🟢

If Mitigated

With proper rate limiting and monitoring, attacks would be detected and blocked before successful exploitation.

🌐 Internet-Facing: HIGH - The vulnerability affects authentication functionality that may be exposed to the internet for remote users.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows attackers with network access to compromise user accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit using automated tools for brute-force attacks against the password reset endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6204 and later

Vendor Advisory: https://www.manageengine.com/products/self-service-password/advisory/CVE-2022-36413.html

Restart Required: Yes

Instructions:

1. Download ADSelfService Plus version 6204 or later from the ManageEngine website. 2. Stop the ADSelfService Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Implement Rate Limiting

all

Configure web application firewall or load balancer to limit requests to password reset endpoints

Disable IDM Integration

all

Temporarily disable IDM application integration if not required

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to ADSelfService Plus servers
  • Enable detailed logging and monitoring for brute-force attempts on password reset endpoints

🔍 How to Verify

Check if Vulnerable:

Check the ADSelfService Plus version in the web interface or installation directory. Versions 6203 and earlier are vulnerable.

Check Version:

Check the version in the web interface at https://<server>:<port>/ or examine the build.txt file in the installation directory.

Verify Fix Applied:

Verify the version is 6204 or later and test password reset functionality with rate limiting.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from single IP
  • Unusual patterns of password reset requests
  • Successful password resets for multiple accounts in short timeframe

Network Indicators:

  • High volume of POST requests to /RestAPI/LogonCustomization/ResetPassword endpoint
  • Traffic patterns indicating automated brute-force tools

SIEM Query:

source="ADSelfService Plus" AND (event_type="password_reset" AND count > 10 within 5 minutes)

🔗 References

📤 Share & Export