CVE-2024-38868

7.6 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to isolate devices in ManageEngine Endpoint Central due to incorrect authorization checks. Attackers could disconnect managed endpoints from the network without proper permissions. Organizations using vulnerable versions of Endpoint Central are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine Endpoint Central
Versions: All versions before 11.3.2406.08 and before 11.3.2400.15
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both on-premise and cloud deployments of Endpoint Central.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could isolate critical infrastructure devices, causing widespread network disruption and business downtime.

🟠

Likely Case

Unauthorized users isolate individual endpoints, disrupting user productivity and requiring manual reconnection.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to isolated segments with quick detection.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires some access, internet-facing instances could be targeted by authenticated attackers.
🏢 Internal Only: HIGH - Internal users with any level of access could exploit this to disrupt operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the Endpoint Central interface but bypasses authorization checks for device isolation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.3.2406.08 or 11.3.2400.15

Vendor Advisory: https://www.manageengine.com/products/desktop-central/security-updates-ngav.html

Restart Required: Yes

Instructions:

1. Download the latest patch from ManageEngine support portal. 2. Backup current installation. 3. Apply the patch following vendor instructions. 4. Restart the Endpoint Central service.

🔧 Temporary Workarounds

Restrict Access to Device Isolation Feature

all

Temporarily disable or restrict permissions for device isolation functionality

Enhanced Monitoring

all

Implement alerts for device isolation events

🧯 If You Can't Patch

  • Implement strict access controls and review all user permissions
  • Monitor logs for unauthorized device isolation attempts

🔍 How to Verify

Check if Vulnerable:

Check Endpoint Central version in admin console or via version file in installation directory

Check Version:

On Windows: Check 'About' in Endpoint Central console. On Linux: Check version.txt in installation directory.

Verify Fix Applied:

Verify version is 11.3.2406.08 or 11.3.2400.15 or later

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized device isolation events
  • Multiple devices isolated in short timeframe
  • Isolation events from unexpected user accounts

Network Indicators:

  • Sudden disconnection of managed endpoints
  • Unusual isolation requests to Endpoint Central API

SIEM Query:

source="endpoint_central" AND (event_type="device_isolation" OR action="isolate")

🔗 References

📤 Share & Export