Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-28958 : Security Advisory and Response

Discover how CVE-2021-28958 affects Zoho ManageEngine ADSelfService Plus, its impact, technical details, and mitigation steps. Learn how to prevent unauthenticated Remote Code Execution now.

Zoho ManageEngine ADSelfService Plus through 6101 is vulnerable to unauthenticated Remote Code Execution while changing the password.

Understanding CVE-2021-28958

This CVE highlights a critical vulnerability in Zoho ManageEngine ADSelfService Plus that can be exploited by attackers to execute remote code without authentication.

What is CVE-2021-28958?

The vulnerability in Zoho ManageEngine ADSelfService Plus through 6101 allows threat actors to perform remote code execution when modifying passwords, posing a severe risk to organizations.

The Impact of CVE-2021-28958

The impact of this vulnerability is significant, potentially leading to unauthorized access to sensitive information, system compromise, and further exploitation of the affected systems.

Technical Details of CVE-2021-28958

This section delves into the specifics of the vulnerability, including the description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The vulnerability enables unauthenticated remote code execution within Zoho ManageEngine ADSelfService Plus through version 6101, making it a high-risk security issue.

Affected Systems and Versions

All versions of Zoho ManageEngine ADSelfService Plus up to 6101 are susceptible to this flaw, emphasizing the critical need for immediate action by users and administrators.

Exploitation Mechanism

Attackers can exploit this vulnerability by initiating a certain action related to changing passwords, ultimately gaining unauthorized access and control over the targeted systems.

Mitigation and Prevention

To address CVE-2021-28958 effectively, organizations must implement immediate steps, follow long-term security practices, and diligently apply patching and updates.

Immediate Steps to Take

Organizations should promptly update Zoho ManageEngine ADSelfService Plus to the latest version, restrict access to the application, and monitor all user activities closely to detect any suspicious behavior.

Long-Term Security Practices

Establishing robust access control measures, conducting regular security audits, and providing comprehensive cybersecurity training to employees are crucial for enhancing long-term security posture.

Patching and Updates

Regularly applying security patches and updates released by Zoho ManageEngine is essential to mitigate the risk posed by CVE-2021-28958 and safeguard systems from potential exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now