Remote Code Execution Vulnerability in ManageEngine Desktop Central - Binary Defense

Threat Watch

Share on facebook
Share on twitter
Share on linkedin

Remote Code Execution Vulnerability in ManageEngine Desktop Central

On March 5th, a functional exploit for an unpatched vulnerability in ManageEngine Desktop Central was published by security researcher Steven Seely. The exploit allows attackers to upload files and remotely run commands with SYSTEM permissions, without any authentication required. Desktop Central is a Zoho product used for endpoint management that Managed Service Providers (MSPs) use frequently. The exploit could allow attackers to gain complete control of servers that are connected to the Internet or move laterally to internal servers from an initial compromise of a workstation. A search on Shodan revealed approximately 2,300 publicly exposed Desktop Central servers that could be targeted.

ANALYST NOTES

Zoho has announced that a patch is expected later today (March 6th), which should be applied as soon as possible. Until the patch is installed, access to affected Desktop Central servers should be limited using firewall rules to only the IP addresses that need to access them. Endpoint Detection and Response (EDR) software monitoring servers and workstations is an important part of defense to detect any intrusions that may occur as a result of this or other exploits. For more information, please see: https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.