The US Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned of cyberattacks targeting a recently addressed vulnerability in Zoho ManageEngine.
Acquired by Zoho in 2014, the enterprise IT software provides management capabilities for identity and access, endpoints, enterprise services, security information and events, and IT operations.
Tracked as CVE-2022-35405 (CVSS score of 9.8), the exploited security flaw is described as a remote code execution (RCE) bug impacting ManageEngine Password Manager Pro before 12101, ManageEngine PAM360 before 5510, and ManageEngine Access Manager Plus before 4303.
In ManageEngine Password Manager Pro and PAM360, no authentication is required for successful exploitation. An attacker targeting vulnerable ManageEngine Access Manager Plus instances, however, does need to be authenticated.
Zoho released patches to address this security bug in June, when it also warned that proof-of-concept (PoC) code targeting the vulnerability was available online.
“The exploit PoC for the above vulnerability is available in public. We strongly recommend our customers to upgrade the instances of Password Manager Pro, PAM360 and Access Manager Plus immediately,” Zoho said in its advisory.
The researcher who discovered the flaw published a blog post earlier this month to describe his findings.
On Thursday, CISA added CVE-2022-35405 to its Known Exploited Vulnerabilities (KEV) catalog, saying that it has evidence of active exploitation.
Warning that vulnerabilities in the KEV catalog are typically exploited for initial access, CISA says that federal agencies have until October 13 to apply the relevant patches for CVE-2022-35405.
Federal agencies are required by the Binding Operational Directive (BOD) 22-01 to resolve known security issues in their environments, but CISA notes that all organizations should review the KEV catalog and prioritize timely remediation.
Related: FBI Sees APTs Exploiting Recent ManageEngine Desktop Central Vulnerability
Related: U.S. Agencies Warn of APTs Exploiting Recent ADSelfService Plus Zero-Day
Related: Threat Actors Start Exploiting Meeting Owl Pro Vulnerability Days After Disclosure

More from Ionut Arghire
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
- Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
- Over 200 Organizations Targeted in Chinese Cyberespionage Campaign
- Nigerian BEC Scammer Sentenced to Prison in US
- China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- iOS Security Update Patches Exploited Vulnerability in Older iPhones
Latest News
- Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
- LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
- Blockchain Security Firm True I/O Raises $9 Million
- Spera Banks $10 Million to Tackle Identity and Access Sprawl
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
