• Language chooser
    • USA (English)
    • France (Français)

Zoho ManageEngine RCE Vulnerability

Released: Apr 20, 2023

Updated: Sep 07, 2023


High Severity

Zoho Vendor

Vulnerability Type


Multiple Zoho ManageEngine products exploited in the wild

Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus, Password Manager Pro and ADSelfService Plus, allow remote code execution due to the usage of an outdated third party dependency, Apache Santuario. Successful exploitation could lead to remote code execution and evidence of exploitation in the wild by Advanced Persistent Threat (APT) Groups. Learn More »

Common Vulnerabilities and Exposures

CVE-2022-47966

Background

ManageEngine’s products are widely used across enterprises with broad suite of IT management software which perform several important business functions. Previously in 2021, we saw a different vulnerability, Zoho ManageEngine ServiceDesk Plus (CVE-2021-44077) exploited in the wild. Full Outbreak Report can be read here: https://www.fortiguard.com/outbreak-alert/zoho-exploit

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


Jan 20, 2023: FortiGuard Labs released a Threat Signal Report on Proof-of-Concept Released for Zoho ManageEngine RCE vulnerability (CVE-2022-47966).
https://www.fortiguard.com/threat-signal-report/4954/

Jan 23,2023: FortiGuard Labs released an IPS signature (ID: 52571) to detect and block any attack attempts targeting CVE-2022-47966.


Jan 23, 2023: CISA added CVE-2022-47966 to its Known Exploited Vulnerabilities Catalog (KEV)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog

April 18, 2023: Microsoft Threat Intelligence linked Mint Sandstorm, an Iranian government-backed threat actor to exploit Zoho ManageEngine vulnerability to gain initial access and targeting of US critical infrastructure.
https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/

FortiGuard Labs recomends organizations using any of the affected products listed in ManageEngine’s advisory to update immediately as exploit code is publicly available and exploitation is in the wild.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • IPS

  • Web App Security

DETECT
  • IOC

  • Outbreak Detection

RESPOND
  • Assisted Response Services

  • Automated Response

RECOVER
  • InfoSec Services

IDENTIFY
  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
45.77.121.232 ip Active
163.123.142.210 ip Active
138.68.61.82 ip Active
109.248.150.13 ip Active
cloudfronts.net domain Active
main.cloudfronts.net domain Active
146.4.21.94 ip Active
05e9fe8e9e693cb073ba82096c291145c953ca3a3f8b397... file Active
80.85.241.15 ip Active
185.106.94.146 ip Active
92.118.39.82 ip Active
45.154.14.194 ip Active
45.154.14.194:443 ip Active
http://50.19.48.59:82/me.bat url Active
19eac6f39226bf9e63fa6fbd8b1cd4cbe5ecb43d0d0d052... file Active
45.154.14.194:8080 ip Active
c49d92f2b88e979bea6be4eb05a0ce564aeb13177d18bf9... file Active
http://149.28.57.130:443/bdredline url Active
http://149.28.57.130:443/Import.reg url Active
http://149.28.57.130:443/time.bat url Active
http://45.154.14.194:443/cmd.txt url Active
http://45.154.14.194:443/Import.reg url Active
http://45.154.14.194:443/K7AVWScn.dll url Active
http://45.154.14.194:443/K7AVWScn.exe url Active
http://45.154.14.194:443/K7AVWScn.pfx url Active
http://45.154.14.194:443/K7AVWScn.txt url Active
http://45.154.14.194:443/MainFilterInitializer.jar url Active
http://45.154.14.194:443/msftedit.dll url Active
http://45.154.14.194:443/OLE.PDB url Active
http://45.154.14.194:443/time.bat url Active
http://45.154.14.194:8080/conhost.exe url Active
149.28.57.130 ip Active
149.28.57.130:443 ip Active
78.141.247.105 ip Active
78.141.247.105:443 ip Active
http://163.123.142.210/bypass.ps1 url Active
111.68.7.122 ip Active
111.68.7.122:8080 ip Active
111.68.7.122:8081 ip Active
149.28.193.216 ip Active
172.93.193.64 ip Active
172.93.193.64:40700 ip Active
45.61.136.188 ip Active
45.61.136.188:443 ip Active
50.19.48.59 ip Active
50.19.48.59:82 ip Active
http://111.68.7.122:8081/svhost.exe url Active
http://146.4.21.94/tmp/tmp/log.php url Active
http://172.93.193.64/file.exe url Active
108.62.118.160 ip Active
ed8ec7a8dd089019cfd29143f008fa0951c56a35d73b2e1... file Active
http://146.4.21.94/tmp/tmp/comp.dat url Active
http://146.4.21.94/tmp/tmp/logs.php url Active
ec2-15-207-207-64.ap-south-1.compute.amazonaws.com domain Active
http://ec2-15-207-207-64.ap-south-1.compute.ama... url Active
108.61.186.55 ip Active
108.61.186.55:443 ip Active
773760fd71d52457ba53a314f15dddb1a74e8b2f5a90e5e... file Active
db6a9934570fa98a93a979e7e0e218e0c9710e5a787b18c... file Active
e3027062e602c5d1812c039739e2f93fc78341a67b77692... file Active
http://109.248.150.13/EsaFin.exe url Active
http://146.4.21.94/boards/boardindex.php url Active
http://146.4.21.94/editor/common/cmod url Active
179.60.147.4:58731 ip Active
193.142.146.226 ip Active
334c2d0af191ed96b15095a4a098c400f2c0ce6b9c66d18... file Active
47dacb8f0b157355a4fd59ccbac1c59b8268fe84f3b8a46... file Active
6dcc7b5e913154abac69687fcfb6a58ac66ec9b8cc7de7a... file Active
79a9136eedbf8288ad7357ddaea3a3cd1a57b7c6f82adff... file Active
102.129.145.232 ip Active
103.105.49.108 ip Active
104.238.234.145 ip Active
144.202.2.71 ip Active
154.6.91.26 ip Active
154.6.93.22 ip Active
154.6.93.32 ip Active
154.6.93.5 ip Active
184.170.241.27 ip Active
191.96.106.40 ip Active
207.246.105.240 ip Active
45.90.123.194 ip Active
47.90.240.218 ip Active
68.177.56.38 ip Active
179.60.147.4 ip Active
154.6.93.12 ip Active
154.6.93.24 ip Active
36e661edc1ad4e44ba38d8f7a6bd00c2b4bc32e9fae8b95... file Active
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0