CVE-2024-0252

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code on ManageEngine ADSelfService Plus servers due to improper input handling in the load balancer component. Organizations using ADSelfService Plus versions 6401 and below are affected. Attackers must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • ManageEngine ADSelfService Plus
Versions: 6401 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with load balancer component enabled are vulnerable. Authentication is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal credentials, deploy ransomware, or pivot to other network resources.

🟠

Likely Case

Privilege escalation leading to domain admin compromise, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to contain the breach.

🌐 Internet-Facing: HIGH if exposed to internet with authenticated users, as attackers can exploit remotely after credential compromise.
🏢 Internal Only: HIGH as authenticated internal users or compromised accounts can exploit to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication but the vulnerability is in a core component, making reliable exploitation likely once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6402 and above

Vendor Advisory: https://www.manageengine.com/products/self-service-password/advisory/CVE-2024-0252.html

Restart Required: Yes

Instructions:

1. Download ADSelfService Plus version 6402 or later from ManageEngine website. 2. Stop the ADSelfService Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Disable Load Balancer Component

all

Temporarily disable the vulnerable load balancer component if not required for operations.

Navigate to ADSelfService Plus admin console > Configuration > Load Balancer > Disable

Restrict Network Access

all

Limit access to ADSelfService Plus to only trusted IP addresses using firewall rules.

Windows: netsh advfirewall firewall add rule name="Block ADSSP" dir=in action=block remoteip=any localport=8888 protocol=TCP
Linux: iptables -A INPUT -p tcp --dport 8888 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ADSelfService Plus servers from critical assets.
  • Enforce multi-factor authentication and strong password policies to reduce credential compromise risk.

🔍 How to Verify

Check if Vulnerable:

Check ADSelfService Plus version in admin console under Help > About. If version is 6401 or below, system is vulnerable.

Check Version:

Windows: Check installation directory for version.txt or use 'sc query ADSelfService Plus'. Linux: Check /opt/ManageEngine/ADSelfService Plus/version.txt

Verify Fix Applied:

After patching, verify version shows 6402 or higher in Help > About. Test load balancer functionality if enabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from ADSelfService Plus service
  • Suspicious authentication attempts followed by load balancer component activity
  • Error logs related to load balancer parsing failures

Network Indicators:

  • Unusual outbound connections from ADSelfService Plus server
  • Traffic spikes on load balancer ports (typically 8888)

SIEM Query:

source="ADSelfService Plus" AND (event_id="4688" OR process_name="cmd.exe" OR process_name="powershell.exe")

🔗 References

📤 Share & Export