Zoho has shipped an urgent patch for an authentication bypass vulnerability in its ManageEngine ADSelfService Plus alongside a warning that the bug is already exploited in attacks.
Tracked as CVE-2021-40539, the security flaw is deemed critical as it could be exploited to take over a vulnerable system.
The issue, according to a Zoho advisory, affects the REST API URLs in ADSelfService Plus and could be abused to achieve remote code execution. Technical details on the vulnerability have yet to be published.
“This is a critical issue. We are noticing indications of this vulnerability being exploited,” Zoho warned.
All ADSelfService Plus builds up to 6113 were found vulnerable to the issue and customers are advised to immediately update ADSelfService Plus to build 6114 or later.
In a separate advisory on Tuesday, the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) urged administrators to review Zoho’s advisory and update ADSelfService Plus immediately.
“CVE-2021-40539 has been detected in exploits in the wild. A remote attacker could exploit this vulnerability to take control of an affected system,” CISA said.
An integrated self-service password management and single sign-on solution, ManageEngine ADSelfService Plus can be used with Active Directory and cloud apps to create password policies, implement authentication techniques, and enforce two-factor authentication (2FA), among others.

More from Ionut Arghire
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
