
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-47966 is a critical remote code execution vulnerability affecting multiple Zoho ManageEngine on-premise products. The vulnerability stems from the use of Apache Santuario xmlsec (XML Security for Java) version 1.4.1, where the XSLT features require the application to implement certain security protections, which the ManageEngine applications failed to provide. The vulnerability was discovered by Khoadha of Viettel Cyber Security and disclosed in January 2023. The vulnerability affects numerous ManageEngine products including ServiceDesk Plus (through version 14003), ADSelfService Plus (before 6211), and many others. Exploitation is only possible if SAML SSO has ever been configured for a product, with some products requiring SAML SSO to be currently active (ManageEngine Advisory).
The vulnerability exists due to an improper order of XML signature validation steps in Apache Santuario 1.4.1. The reference validation is performed before signature validation, allowing execution of malicious XSLT transforms. The XSLT is a turing-complete language that, in the ManageEngine environment, can execute arbitrary Java code. The vulnerability can be exploited by sending a malicious SAML response to the service provider's Assertion Consumer URL. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (Horizon3 Analysis).
Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary code on affected systems with system-level privileges. This can lead to complete system compromise, allowing attackers to gain unauthorized access, establish persistence, and move laterally through the network. The vulnerability has been actively exploited by multiple nation-state APT actors to gain unauthorized access to organizations' networks (CISA Advisory).
Organizations should immediately update affected ManageEngine products to their respective fixed versions. For ServiceDesk Plus, update to version 14004 or later; for ADSelfService Plus, update to version 6211 or later; and similarly for other affected products. The vulnerability has been fixed by updating the third-party module Apache Santuario to a recent version. Organizations should also monitor for unauthorized use of remote access software using endpoint detection tools and remove unnecessary accounts and groups from the enterprise (ManageEngine Advisory).
The security community has shown significant concern about this vulnerability due to its critical nature and active exploitation by nation-state actors. CISA has added this vulnerability to their Known Exploited Vulnerabilities (KEV) catalog and issued a joint advisory with the FBI and CNMF detailing the exploitation by multiple nation-state APT actors. Security researchers have published detailed technical analyses and proof-of-concept exploits, highlighting the severity and exploitability of the vulnerability (CISA Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."