Zero-Day Exploits

Zoho ManageEngine CVE-2021-44077: When IT Management Tools Get Owned

APT actors exploited CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus to breach critical infrastructure. An unauthenticated RCE in the software that manages your IT.

Yukti Singhal
Security Researcher
6 min read

In November 2021, the FBI and CISA issued a joint advisory warning that an APT group was actively exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus. The vulnerability — an unauthenticated remote code execution flaw — was being used to deploy web shells, steal credentials, and move laterally across networks belonging to critical infrastructure organizations. The irony was thick: the software designed to manage IT infrastructure had become the entry point for compromising it.

ManageEngine in the Enterprise

Zoho ManageEngine is a suite of IT management tools used by tens of thousands of organizations worldwide. ServiceDesk Plus is their IT help desk and asset management platform. It sits at the center of IT operations, with access to:

  • Asset inventories — every device, server, and workstation in the organization
  • User directories — Active Directory integration with user accounts and permissions
  • Configuration management — software deployment, patch management, and configuration data
  • Help desk tickets — often containing sensitive information, credentials, and internal procedures

Compromising ManageEngine means compromising the organization's IT management plane. An attacker with access to ServiceDesk Plus can see the entire network topology, understand what software is deployed where, and potentially push changes to managed systems.

The Vulnerability

CVE-2021-44077 is an unauthenticated remote code execution vulnerability in Zoho ManageEngine ServiceDesk Plus versions 11305 and earlier. The vulnerability exists in the REST API servlet, where a specially crafted request can upload a malicious file that is then executed on the server.

The attack is straightforward:

  1. Send a crafted multipart HTTP request to the ServiceDesk Plus API endpoint
  2. The request uploads an executable file (typically a web shell) to the server
  3. The file is placed in a web-accessible directory
  4. The attacker accesses the uploaded file via HTTP, gaining code execution

No authentication is required. The API endpoint was accessible by default, and the file upload validation was insufficient to prevent the upload of executable content.

The APT Campaign

The campaign exploiting CVE-2021-44077 was attributed to an APT group that had previously targeted Zoho ManageEngine products, including CVE-2021-40539 (an authentication bypass in ADSelfService Plus). The attackers demonstrated a clear focus on ManageEngine products across multiple campaigns.

Attack Timeline

  • September 2021: CISA issues an advisory for CVE-2021-40539 in ManageEngine ADSelfService Plus
  • October 2021: The same APT group pivots to exploiting CVE-2021-44077 in ServiceDesk Plus
  • November 2021: FBI and CISA issue a joint advisory identifying active exploitation of both vulnerabilities
  • December 2021: Zoho releases patches and additional security hardening for ServiceDesk Plus

Post-Exploitation Behavior

After gaining initial access through CVE-2021-44077, the attackers followed a consistent playbook:

Web shell deployment: The attackers deployed a customized Godzilla web shell, providing persistent remote access through the ServiceDesk Plus web interface.

Credential harvesting: Using the web shell, the attackers dumped credentials from the ServiceDesk Plus database (which often contained admin credentials for managed systems) and from the server's memory using tools like Mimikatz.

Lateral movement: Armed with harvested credentials, the attackers moved laterally to domain controllers, file servers, and other high-value targets within the network.

Data exfiltration: The attackers exfiltrated sensitive data, including network architecture documents, user lists, and configuration files that would support further intrusion activities.

Why IT Management Tools Are High-Value Targets

IT management platforms like ManageEngine occupy a privileged position in enterprise networks. They have:

Broad network access: IT management tools need to communicate with every managed system, so firewall rules typically allow them wide-ranging network access.

Elevated credentials: These tools store credentials for managing systems across the enterprise — domain admin credentials, service accounts, local admin passwords.

Rich data: Asset inventories, network diagrams, patch status reports, and configuration data provide attackers with a complete map of the target network.

Trusted status: Traffic from IT management tools is expected and rarely flagged as suspicious. An attacker operating through ManageEngine can reach systems and perform actions that would trigger alerts if done from any other source.

This makes IT management platforms ideal pivot points for nation-state actors conducting espionage campaigns. A single compromise provides the reconnaissance data and credentials needed to access any system in the organization.

The ManageEngine Pattern

CVE-2021-44077 wasn't an isolated incident. ManageEngine products have had a troubling series of critical vulnerabilities:

  • CVE-2021-40539: Authentication bypass in ADSelfService Plus, exploited by APT groups
  • CVE-2022-47966: Unauthenticated RCE via SAML in multiple ManageEngine products
  • CVE-2023-35708: SQL injection in MOVEit-connected ManageEngine products
  • CVE-2022-35405: RCE in ManageEngine Password Manager Pro

The pattern suggests systemic security issues in the ManageEngine codebase, particularly around authentication and input validation. Organizations relying on ManageEngine products need to treat them as high-risk components requiring additional security controls.

Defensive Recommendations

1. Isolate IT Management Infrastructure

IT management tools should be on a separate management network segment with strict access controls. Access to the management plane should require additional authentication (jump boxes, VPN, MFA) beyond what's required for general network access.

2. Monitor Management Tool Activity

All actions performed through IT management tools should be logged and monitored. Unusual activities — new admin accounts, mass credential queries, unexpected file uploads — should trigger immediate alerts.

3. Limit Stored Credentials

IT management tools often store more credentials than necessary. Audit what credentials are stored in ServiceDesk Plus and similar tools, and reduce them to the minimum required. Use time-limited credentials where possible.

4. Patch Management Tools First

When a vulnerability is disclosed in an IT management tool, it should be the highest priority for patching — even higher than production systems. The blast radius of a compromised management tool is the entire managed environment.

5. Validate Network Exposure

ServiceDesk Plus should never be directly accessible from the internet. Review network configurations to ensure management tools are only accessible from authorized management networks.

How Safeguard.sh Helps

Safeguard.sh addresses the risks that CVE-2021-44077 highlighted about IT management infrastructure:

  • Management Tool Monitoring: Safeguard.sh tracks the security posture of your IT management tools alongside your production systems, ensuring they receive appropriate security attention.
  • Vulnerability Prioritization: Safeguard.sh considers the blast radius of vulnerabilities, automatically prioritizing issues in tools like ManageEngine that have broad access to your environment.
  • SBOM Analysis: By cataloging the components within your management tools, Safeguard.sh identifies vulnerabilities in the frameworks and libraries they depend on, not just the application itself.
  • Continuous Compliance: Safeguard.sh helps ensure your IT management infrastructure meets security baselines and compliance requirements, flagging configuration drift and missing patches.

The exploitation of ManageEngine proved that the software managing your infrastructure is as critical as the infrastructure itself. Safeguard.sh ensures you never lose visibility into these essential tools.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.