Breaking

Desktop Central vulnerability allows authentication bypass, Patch now!

The leading software maker ManageEngine, a div of Zoho Corp has released patches for a critical security vulnerability that existed in its endpoint management software Desktop Central and Desktop Central MSP.

The security vulnerability will allow a remote actor to exploit it and execute remote operations to gain unauthorized access to its affected servers.

Details on the Desktop Central Vulnerability

The Desktop Central vulnerability is tracked as CVE-2021-4457, and allows authentication bypass that will give privilege for attackers to read unauthorized information or write an arbitrary zip file on the server. The company stated that the vulnerability is critical and is best to patch the same immediately.

Osword from SGLAB of Legendsec at Qi’anxin Group is the one wo discovered and reported the vulnerability. ManageEngine said the patched version will be 10.1.2127.9.

ManageEngine has addressed multiple vulnerabilities in recent months which includes,

  • CVE-2021-40539 with a CVSS score of 9.8, authentication bypass vulnerability affecting ManageEngine AD SelfService Plus.
  • CVE-2021-44515 with a CVSS score of 9.8, authentication bypass vulnerability affecting ManageEngine Desktop Central
  • CVE-2021-44077 with a CVSS score of 9.8, unauthenticated remote code execution vulnerability in ManageEngine ServiceDesk Plus and SupportCenter Plus.

Desktop Central instances have been exploited in the past by attackers as the remote monitoring and management tools are a sweet spot for hackers to breach into high-profile targets. As per the KELA analysis and study on Desktop Central in 2020, the following two victims was identified,

KELA managed to identify the victims and indirectly confirm they were using the software in question. The first target is a Turkish company with a revenue of $221 Million (the access cost 1.5 BTC). The second victim is a Canadian corporation with a revenue of $338 Million, whose access has been sold in a few hours – it was offered for 1 BTC. -KELA report.

A Shodan search revealed that around 2800 Desktop Central servers could be exposed to wild attacks if not patched immediately.

Source: KELA Report

So it is best to update ManageEngine Desktop Central patches immediately to ensure your network and the data are safe from threat actors that could soon start exploiting this vulnerability in the wild. Thanks to the company for handling the vulnerability early and giving a fix to the exploitation.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago