Zoho ManageEngine Vulnerability
An unauthenticated RCE in ManageEngine ServiceDesk Plus
https://pitstop.manageengine.com/portal/en/community/topic/security-advisory-for-cve-2021-44077-unauthenticated-rce-vulnerability-in-servicedesk-plus-msp-versions-10527-till-10529
APT Actors are actively exploiting Zoho ManageEngine ServiceDesk Plus which is an IT help desk software with asset management. The exploit is tracked via CVE-2021-44077 and rated critical due to its capability for unauthenticated remote code execution (RCE).
Background
The ManageEngine ServiceDesk Plus released a security advisory on authentication bypass vulnerability.
Latest Developments
On 2nd of December 2021, CISA has announced active exploitation of CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus. Based on FortiGuard statistics from the last few days, Malware using this vulnerability is active in the wild.
arrow_icon
PROTECT

Countermeasures across the security fabric for protecting assets, data and network from cybersecurity events:

Reconnaissance
Weaponization

Delivery

AV

Blocks exploitation of the Zoho ManageEngine Vulnerability

DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
DB 89.07442
AV (Pre-filter)

Blocks exploitation of the Zoho ManageEngine Vulnerability

DB 89.07442
DB 89.07442
DB 89.07442

Exploitation

IPS

Blocks exploitation of the Zoho ManageEngine Vulnerability

DB 19.219
DB 19.219
DB 19.219
DB 19.219
DB 19.219
Installation
C2
Action
arrow_icon
DETECT

Find and correlate important information to identify an outbreak, the following updates are available to raise alert and generate reports:

Outbreak Detection

DB 1.00037
Threat Hunting
Content Update

DB 314
arrow_icon
RESPOND

Develop containment techniques to mitigate impacts of security events:

Automated Response

Services that can automaticlly respond to this outbreak.

Assisted Response Services

Experts to assist you with analysis, containment and response activities.

arrow_icon
RECOVER

Improve security posture and processes by implementing security awareness and training, in preparation for (and recovery from) security incidents:

NOC/SOC Training

Train your network and security professionals and optimize your incident response to stay on top of the cyberattacks.

End-User Training

Raise security awareness to your employees that are continuously being targetted by phishing, drive-by download and other forms of cyberattacks.

arrow_icon
IDENTIFY

Identify processes and assets that need protection:

Attack Surface Hardening

Check Security Fabric devices to build actionable configuration recommendations and key indicators.

Vulnerability Management

Reduce the attack surface on software vulnerabilities via systematic and automated patching.