CVE-2021-40539 is a vulnerability in Zoho Corp Manageengine Adselfservice Plus
Published on September 7, 2021
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
Known Exploited Vulnerability
This Zoho Corp. ManageEngine ADSelfService Plus Version 6113 and Earlier Authentication Bypass vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Zoho ManageEngine ADSelfService Plus versions 6113 and earlier contain an authentication bypass vulnerability which allows for Remote Code Execution.
The following remediation steps are recommended / required by November 17, 2021: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2021-40539 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
Use of Incorrectly-Resolved Name or Reference
The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
Products Associated with CVE-2021-40539
Want to know whenever a new CVE is published for Zoho Corp Manageengine Adselfservice Plus? stack.watch will email you.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.