Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
Published 2021-11-29 04:15:07
Updated 2022-07-12 17:42:04
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2021-44077

CVE-2021-44077 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2021-44077
Added on 2021-12-01 Action due date 2021-12-15

Exploit prediction scoring system (EPSS) score for CVE-2021-44077

97.38%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2021-44077

  • ManageEngine ServiceDesk Plus CVE-2021-44077
    Disclosure Date: 2021-09-16
    First seen: 2022-12-23
    exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077
    This module exploits CVE-2021-44077, an unauthenticated remote code execution vulnerability in ManageEngine ServiceDesk Plus, to upload an EXE (msiexec.exe) and execute it as the SYSTEM account. Note that build 11305 is vulnerable to the authentication bypas

CVSS scores for CVE-2021-44077

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

References for CVE-2021-44077

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!