Share This:

A critical Zoho ManageEngine Remote Code Execution (RCE) flaw is being actively exploited according to The US Cybersecurity and Infrastructure Security Agency (CISA). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Password Manager Pro, PAM360 and Access Manager Plus without the need of authentication. Barracuda MSP recommends updating Password Manager Pro, PAM360 and Access Manager Plus immediately to patch this vulnerability.

What is the threat?

Remote Code Execution is a method to inject and execute code in a targeted machine or system in local or wide area networks. A successful code execution allows the attacker to gain access to web applications/servers and to compromise and destroy data, install ransomware, or completely take over an entire enterprise network. Multiple Zoho ManageEngine products are impacted including Zoho ManageEngine PAM360, Password Manager Pro, Access Manager Pro.

Why is it noteworthy?

There is a proof-of-concept exploit for this vulnerability. It is strongly recommended for customers to upgrade their instances of the Zoho ManageEngine products. The vulnerability allows malicious attackers to easily take over a network which they have initial access to, and they can exfiltrate sensitive business data and disrupt business operations. “We’ve seen real-world environments where just exploiting this vulnerability alone is enough to take over the enterprise. This vulnerability is not one to hold off patching” (Sunkavally).

What is the exposure or risk?

Any customers using Zoho ManageEngine products including Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Pro are at risk for this RCE vulnerability. An attacker with initial access to a compromised network can easily extract high-privileged credentials, move laterally, and take over the entire network. Zoho has fix the RCE vulnerability, and customers of these products must upgrade their products to patch the vulnerability.

What are the recommendations?

Barracuda MSP recommends the following actions to address this vulnerability:

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact our Security Operations Center.

*Did you know? The Cybersecurity Threat Advisory has moved to SmarterMSP.com. Subscribe to SmarterMSP.com for the latest cybersecurity insights and news and information to help you enhance your MSP business.


Share This:
Anika Jishan

Posted by Anika Jishan

Anika is a Cybersecurity Analyst at Barracuda MSP. She's a security expert, working on our Blue Team within our Security Operations Center. Anika supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *