ARMORYZE
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification

Critical Vulnerability in Manage Engine ADAudit Plus Allows Remote Code Execution

4/7/2022

 
Picture
On June 29, security researchers at Horizon3.ai published a blog about a recently disclosed critical vulnerability in Zoho ManageEngine ADAudit Plus.
 
Manage Engine ADAudit Plus is a compliance tool that monitors Active Directory (AD). ADAudit Plus is a popular tool to gain full visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes.
 
CVEID: CVE-2022-28219
 
Vulnerability Details: ManageEngine ADAudit Plus had vulnerable endpoints that allowed an unauthenticated attacker to exploit XML External Entities (XXE), Java deserialization and path traversal vulnerabilities. The chain could be leveraged to unauthenticated remote code execution.
 
Affected Software Version(s): All ADAudit Plus builds below 7060
 
Impact Analysis:
An unauthenticated attacker would be able to remotely execute an arbitrary code in the ADAudit Plus server. A successful exploitation of this critical vulnerability, CVE-2022-28219, could allow an attacker to take over an entire enterprise network. The effect of this vulnerability flaw will make it very attractive to ransomware groups and initial access brokers.
 
Solution:
This vulnerability impacts all versions of ADAudit Plus builds below 7060. Organizations should ensure they are running the fixed or later version of ADAudit Plus.
Fixed Version(s): Build 7060
Fixed on: 30th March, 2022
 
To help organizations minimize the risks caused by the CVE-2022-28219 exploitation attempts, customers can subscribe for a free trial of Risk Based Vulnerability Management solution from Armoryze.
 

Comments are closed.
    Book Free - Cyber Security Assessment & Consultation!
    BOOK NOW

      Free - Sign up for email cyber security news & updates!​
    REGISTER ME NOW

    Follow Us and Share on Social Media. Join the Community to fight cyber crime.
    Picture
    Picture
© 2023 Armoryze Consultancy Services, All Rights Reserved
Picture
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification