CVE-2021-41828
Zoho ManageEngine Remote Access Plus vulnerability analysis and mitigation

Overview

Zoho ManageEngine Remote Access Plus before version 10.1.2121.1 contained a security vulnerability related to hardcoded credentials in the resetPWD.xml file (CVE-2021-41828). The vulnerability was discovered and disclosed in September 2021, affecting the Remote Access Plus server application. This issue impacted the authentication mechanism of the application (Zoho Changelog, NVD).

Technical details

The vulnerability stemmed from hardcoded credentials being embedded within the resetPWD.xml file in the application's bin directory. The file contained a fixed password and weak fixed salt value, making it susceptible to unauthorized access. The issue was compounded by improper file permissions that allowed the file to be readable by unauthorized users (NestedIf).

Impact

The presence of hardcoded credentials could allow attackers to gain unauthorized access to sensitive system configurations, deployed agent configurations, enterprise system details, user accounts, and other critical information stored in the database. While the database user 'medc' had view-only permissions, limiting the ability to modify data, the exposure of sensitive information posed a significant security risk (NestedIf).

Mitigation and workarounds

The vulnerability was patched in Remote Access Plus version 10.1.2121.1. Security experts recommended using SecureRandom function to generate unique credentials during first-time installation to ensure different credentials across installations. Additional recommendations included using a secure vault for storage, implementing PBKDF2 encryption, leveraging Windows Authentication, and relying on filesystem ACL for connection string security (Zoho Changelog, NestedIf).

Additional resources


SourceThis report was generated using AI

Related Zoho ManageEngine Remote Access Plus vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-47966CRITICAL9.8
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_adselfservice_plus
YesYesJan 18, 2023
CVE-2021-42955HIGH7.8
  • Zoho ManageEngine Remote Access PlusZoho ManageEngine Remote Access Plus
  • cpe:2.3:a:zohocorp:manageengine_remote_access_plus
NoYesNov 17, 2021
CVE-2023-6105MEDIUM5.5
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_supportcenter_plus
NoYesNov 15, 2023
CVE-2022-26777MEDIUM5.3
  • Zoho ManageEngine Remote Access PlusZoho ManageEngine Remote Access Plus
  • cpe:2.3:a:zohocorp:manageengine_remote_access_plus
NoYesApr 16, 2022
CVE-2022-26653MEDIUM5.3
  • Zoho ManageEngine Remote Access PlusZoho ManageEngine Remote Access Plus
  • cpe:2.3:a:zohocorp:manageengine_remote_access_plus
NoYesApr 16, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management