• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Zoho ManageEngine Exploit - CVE-2020-10189

Risk Factors

An unauthenticated attacker with access to a vulnerable Manage Engine Desktop Central server can remotely run arbitrary code on the server. A successful exploit can result in the attacker gaining control of the server and launching additional attacks on network devices, deploying ransomware, or moving laterally across the network.

Kill Chain

Exploitation

Risk Score

88

Detection diagram
Next in Exploitation: Zoho ManageEngine Exploit Attempt - CVE-2019-8394

Attack Background

The ManageEngine Desktop Central service acts as a central server to help manage connected devices, such as workstations, servers, and phones, within an enterprise environment. Desktop Central contains a vulnerability that allows untrusted data in uploaded files to be processed and run as code on the ManageEngine server. To exploit this vulnerability, the attacker submits a POST request to upload a malicious file to a specific folder (\ManageEngine\DesktopCentral_Server\webapps\DesktopCentral\_chart) (1). The attacker then sends a GET request to run the malicious file (2). The malicious code runs on the ManageEngine server with system, or root, privileges. The attacker can then perform additional attacks, such as sending malware or ransomware to connected devices across the network.

Mitigation Options

Upgrade to a fixed version, or configure the affected device to mitigate CVE-2020-10189

MITRE ATT&CK ID

What else can RevealX do for you?