CVE-2022-47966:CVE-2022-47966 is a critical vulnerability in multiple Zoho ManageEngine on-premise products that allows for remote code execution due to improper security protections in the Apache Santuario xmlsec library version 1.4.1.

splash
Back

Description Preview

Multiple Zoho ManageEngine on-premise products, including ServiceDesk Plus and others, are affected by a critical vulnerability that enables remote code execution. This vulnerability arises from the use of Apache Santuario xmlsec (XML Security for Java) version 1.4.1, which does not provide adequate security protections by design. The exploitation of this vulnerability is contingent upon the configuration of SAML Single Sign-On (SSO) for the affected products, with some requiring that SAML SSO is currently active. The vulnerability impacts a wide range of ManageEngine applications, making it imperative for users to address this issue promptly.

Overview

CVE-2022-47966 affects several versions of Zoho ManageEngine products, including but not limited to:

  • ServiceDesk Plus
  • Access Manager Plus
  • Active Directory 360
  • ADAudit Plus
  • ADManager Plus
  • ADSelfService Plus
  • Analytics Plus
  • Application Control Plus
  • Asset Explorer
  • Browser Security Plus
  • Device Control Plus
  • Endpoint Central
  • Key Manager Plus
  • OS Deployer
  • PAM 360
  • Password Manager Pro
  • Patch Manager Plus
  • Remote Access Plus
  • Remote Monitoring and Management (RMM)
  • SupportCenter Plus
  • Vulnerability Manager Plus

The vulnerability is classified as critical with a CVSS score of 9.8, indicating a high potential for exploitation. It allows attackers to execute arbitrary code remotely, which could lead to significant data breaches and system compromises.

Remediation

To mitigate the risks associated with CVE-2022-47966, users of the affected ManageEngine products should:

  1. Update Software: Immediately upgrade to the latest versions of the affected products as specified by Zoho ManageEngine. Ensure that all patches addressing this vulnerability are applied.
  2. Disable SAML SSO: If SAML SSO is not required, consider disabling it to reduce the attack surface.
  3. Monitor Systems: Implement monitoring for any unusual activities or unauthorized access attempts on the affected systems.
  4. Review Security Configurations: Ensure that security configurations are in place to protect against similar vulnerabilities in the future.

References

Early Warning

Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.

Armis Alert Date
Jan 18, 2023
CISA KEV Date
Jan 23, 2023
5days early

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing: Low
    Manufacturing
  2. Public Administration: Low
    Public Administration
  3. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  4. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  5. Educational Services: Low
    Educational Services
  6. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  7. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  8. Accommodation & Food Services: Low
    Accommodation & Food Services
  9. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  10. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  11. Construction: Low
    Construction
  12. Finance and Insurance: Low
    Finance and Insurance
  13. Information: Low
    Information
  14. Mining: Low
    Mining
  15. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background