Remote Code Execution Vulnerability in Zoho ManageEngine ADSelfService Plus
CVE-2018-5353
Key Information:
- Vendor
Zohocorp
- Vendor
- CVE Published:
- 30 September 2020
Badges
What is CVE-2018-5353?
The custom GINA/CP module in Zoho ManageEngine ADSelfService Plus prior to version 5.5 build 5517 is susceptible to a remote code execution vulnerability. This issue arises from the module's failure to authenticate the intended server before launching a browser window, allowing unauthenticated attackers to conduct spoofing attacks. Successful exploitation can lead to code execution in the context of the WinLogon.exe process. The vulnerability is further exacerbated in environments where Network Level Authentication is not enforced, as it can be exploited through Remote Desktop Protocol (RDP). Additionally, if a web server is improperly configured with a certificate, the need for spoofing is eliminated.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved