CVE-2022-28810
Zoho ManageEngine ADSelfService Plus vulnerability analysis and mitigation

Overview

CVE-2022-28810 is a high-severity vulnerability in Zoho ManageEngine ADSelfService Plus affecting builds 6121 and below, discovered in April 2022. The vulnerability allows a remote authenticated administrator to execute arbitrary operating system commands as SYSTEM via the policy custom script feature. Due to the use of a default administrator password (admin), attackers could abuse this functionality with minimal effort. Additionally, a remote and partially authenticated attacker could inject arbitrary commands into the custom script due to an unsanitized password field (Rapid7 Blog, ManageEngine Advisory).

Technical details

The vulnerability stems from a feature that allowed the admin user to execute arbitrary operating system commands after a password reset or account lockout status update. The functionality was accessible through the web interface where administrators could configure custom scripts to run during password synchronization. The vulnerability existed because the %password% variable was passed to the configured script without proper sanitization, allowing command injection. For example, if an admin configured a script like 'cmd.exe /c echo %username% %password%', an attacker could inject arbitrary commands through the password field (Rapid7 Blog).

Impact

The vulnerability allows authenticated attackers to execute remote code on the machine where ADSelfService Plus is installed, running with SYSTEM privileges. Additionally, because passwords weren't properly sanitized or obfuscated, the admin user could potentially observe all password changes, effectively allowing the recovery of valid credentials for Active Directory accounts (Rapid7 Blog, ManageEngine Advisory).

Mitigation and workarounds

ManageEngine fixed this vulnerability in ADSelfService Plus build 6122, released on April 9, 2022. The patch includes several security improvements: only VBScript and PowerShell files are allowed for custom scripts, all scripts must be stored in the /Scripts folder, passwords are now encoded and sent as string literals instead of arguments, and scripts must be placed on disk by a user with local system access rather than through the web interface. Organizations are strongly advised to upgrade to build 6122 or later and change the default admin password (ManageEngine Advisory).

Community reactions

The vulnerability was initially discovered in the wild by Rapid7's MDR team and was reported through Zoho's Bug Bounty program. The discovery was credited to Rapid7 researchers Jake Baines, Hernan Diaz, Andrew Iwamaye, and Dan Kelly. Due to its active exploitation, CISA added this vulnerability to their Known Exploited Vulnerabilities Catalog on March 7, 2023, requiring federal agencies to address it according to BOD 22-01 (CISA Alert, Rapid7 Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management