![]() ![]() This isn’t the first time Zoho ManageEngine has become an easy target for threat actors. When performing a scan with the Shodan tool, the researchers found more than 3,200 implementations of ManageEngine Desktop Central running ports vulnerable to compromise, making this a considerable security risk. In case an administrator finds evidence of compromise, Zoho also recommends initiating a password reset procedure for all services and accounts that have been accessed since the compromised deployment. ![]() The company also recommends using its exploit detection tool to know if an implementation is affected. In addition to requesting the installation of its updates, Zoho mentions that signs of active exploitation have already been detected, which makes it urgent that vulnerable implementations be updated. Tracked as CVE-2021-44515, successful exploitation of this flaw would allow threat actors to evade authentication and execute arbitrary code on vulnerable servers. MANAGEENGINE DESKTOP CENTRAL PORT 8443 IS ALREADY IN USE UPDATEIn a cybersecurity alert, Zoho asked its customers to update their Desktop Central and Desktop Central MSP deployments to the latest version in order to address a critical vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |