CVE-2022-47966

Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario...

Basic Information

CVE State
PUBLISHED
Reserved Date
December 26, 2022
Published Date
January 18, 2023
Last Updated
September 13, 2024
Vendor
n/a
Product
n/a
Description
Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2023-01-23 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2023-01-23 10:45:23 UTC) Source
Used in Malware
Yes (added 2023-01-23 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-01-23 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

manageengine_servicedesk_plus_saml_rce_cve_2022_47966

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-47966

manageengine_endpoint_central_saml_rce_cve_2022_47966

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-47966

manageengine_adselfservice_plus_saml_rce_cve_2022_47966

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-47966

vonahisec/CVE-2022-47966-Scan

Type: github • Created: 2023-01-23 15:49:10 UTC • Stars: 27

Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.

ACE-Responder/CVE-2022-47966_checker

Type: github • Created: 2023-01-23 11:33:29 UTC • Stars: 2

Run on your ManageEngine server

Inplex-sys/CVE-2022-47966

Type: github • Created: 2023-01-23 10:45:23 UTC • Stars: 7

The manage engine mass loader for CVE-2022-47966

horizon3ai/CVE-2022-47966

Type: github • Created: 2023-01-17 21:26:28 UTC • Stars: 126

POC for CVE-2022-47966 affecting multiple ManageEngine products