Vulnerability Description
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zohocorp | Manageengine Adselfservice Plus | < 6.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-AuthExploitThird Party AdvisoryVDB Entry
- https://www.manageengine.comProduct
- https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authenPatchVendor Advisory
- http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-AuthExploitThird Party AdvisoryVDB Entry
- https://www.manageengine.comProduct
- https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authenPatchVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-US Government Resource
FAQ
What is CVE-2021-40539?
CVE-2021-40539 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
How severe is CVE-2021-40539?
CVE-2021-40539 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-40539?
Check the references section above for vendor advisories and patch information. Affected products include: Zohocorp Manageengine Adselfservice Plus.