A security researcher has disclosed details and PoC code for a zero-day vulnerability in the Zoho ManageEngine product via Twitter.

A security expert has disclosed details about a zero-day vulnerability in a Zoho enterprise product via Twitter, a circumstance that could cause serious problems to customers of the company.

The flaw affects Zoho ManageEngine Desktop Central endpoint management solution that helps organizations in managing servers, laptops, desktops, smartphones, and tablets from a central location.

A researcher named Steven Seeley, disclosed technical details and the proof-of-concept code for the Zoho zero-day issue.

“This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine Desktop Central. Authentication is not required to exploit this vulnerability.” read the advisory published by the expert.

“The specific flaw exists within the FileStorage class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.”

The vulnerability resides in the FileStorage class, it is caused by the lack of proper validation of user-supplied data. The attackers can exploit the vulnerability to execute code under the context of SYSTEM and take full control of the vulnerable ManageEngine systems,

The zero-day could be used by threat actors to target organizations and managed service providers (MSPs) using Zoho ManageEngine to deliver malware, especially ransomware.

Searching for exposed Zoho ManageEngine systems online using Shodan we can find over 2300 installs.

Experts also warn that Zoho ManageEngine systems that are not exposed online could be targeted by threat actors once compromised the hosting network. Then attackers can exploit the issue to deliver malware to all the systems on the company’s network.

Experts believe that the availability of a PoC exploit code for the vulnerability will trigger a new wave of attacks targeting the Zoho ManageEngine systems.

At the time there is no fix for the flaw, the company declared that it was not informed by Seeley about the issue and is currently working on a patch. On the other site, Seeley claimed on Twitter that Zoho usually ignored researchers.

Update 06/03/2020

The remote code execution vulnerability in Desktop Central (CVE-2020-10189) has been fixed in build 10.0.479, available at https://manageengine.com/products/desktop-central/service-packs.html…. For more information about the vulnerability, please visit https://t.co/uJedc7dexl

The remote code execution vulnerability in Desktop Central (CVE-2020-10189) has been fixed in build 10.0.479, available at https://t.co/AwOW9tNxO9. For more information about the vulnerability, please visit https://t.co/uJedc7dexl. — ManageEngine (@manageengine) March 6, 2020

We have identified the issue and are working on a patch with top priority. We will update once it is done. ^BG — Zoho (@zoho) March 6, 2020

Pierluigi Paganini