CVE-2023-29084

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users in Zoho ManageEngine ADManager Plus to execute arbitrary commands through proxy settings. Attackers with valid credentials can inject malicious commands that get executed on the underlying system. Organizations using vulnerable versions of ADManager Plus are affected.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: All versions before 7181
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ADManager Plus web interface. Proxy settings functionality must be accessible to the authenticated user.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Privilege escalation to SYSTEM/NT AUTHORITY, credential harvesting, installation of backdoors, and persistence mechanisms.

🟢

If Mitigated

Limited to authenticated user privileges, potentially allowing command execution but constrained by existing security controls.

🌐 Internet-Facing: HIGH if exposed to internet with authenticated access, as attackers can exploit remotely.
🏢 Internal Only: HIGH due to authenticated access requirement being common in internal environments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but is straightforward to execute. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7181 and later

Vendor Advisory: https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-29084.html

Restart Required: Yes

Instructions:

1. Download ADManager Plus build 7181 or later from ManageEngine website. 2. Stop ADManager Plus service. 3. Run the installer/upgrade package. 4. Restart the service. 5. Verify version is 7181+.

🔧 Temporary Workarounds

Restrict Proxy Settings Access

all

Remove or restrict access to proxy configuration functionality for non-admin users

Network Segmentation

all

Isolate ADManager Plus server from critical systems and implement strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls limiting who can authenticate to ADManager Plus
  • Deploy application-level firewall (WAF) with command injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check ADManager Plus version via web interface (Admin → About) or installation directory

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADManager Plus\conf\version.txt' or web interface

Verify Fix Applied:

Confirm version is 7181 or higher and test proxy settings functionality with safe input

📡 Detection & Monitoring

Log Indicators:

  • Unusual proxy configuration changes
  • Command execution patterns in application logs
  • Multiple failed authentication attempts followed by proxy settings access

Network Indicators:

  • Outbound connections from ADManager Plus server to unexpected destinations
  • Unusual HTTP requests to proxy configuration endpoints

SIEM Query:

source="ADManagerPlus" AND (event_description="proxy" OR event_description="command") AND (cmd.exe OR powershell.exe OR wmic.exe)

🔗 References

📤 Share & Export