Vulnerability Details : CVE-2021-44077

Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
Vulnerability category: Execute code
Published 2021-11-29 04:15:07
Updated 2022-07-12 17:42:04
Source MITRE
View at NVD,   CVE.org
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2021-44077 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution
Added on 2021-12-01 Action due date 2021-12-15

Exploit prediction scoring system (EPSS) score for CVE-2021-44077

Probability of exploitation activity in the next 30 days: 97.26%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2021-44077

  • ManageEngine ServiceDesk Plus CVE-2021-44077
    Disclosure Date : 2021-09-16
    exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077
    This module exploits CVE-2021-44077, an unauthenticated remote code execution vulnerability in ManageEngine ServiceDesk Plus, to upload an EXE (msiexec.exe) and execute it as the SYSTEM account. Note that build 11305 is vulnerable to the authentication bypass but not the file upload. The module will check for an exploitable build. Authors: - wvu <[email protected]> - Y4er

CVSS scores for CVE-2021-44077

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
[email protected]
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
[email protected]

References for CVE-2021-44077

Products affected by CVE-2021-44077

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!