The Cybersecurity and Infrastructure Security Agency (CISA) has published an alert on a critical remote code execution (RCE) vulnerability in ManageEngine products and have warned all users to update their systems as soon as possible.
The vulnerability, CVE-2020-10189, is a critical RCE vulnerability discovered and reported by security researchers at the CERT Coordination Center (CERT/CC). It exists in multiple ManageEngine products, including Application Manager, Firewall Analyzer, Password Manager Pro, ServiceDesk Plus, and SupportCenter Plus.
According to CISA, this type of vulnerability gives an attacker the ability to execute malicious code and gain full control of an affected system. The vulnerability also gives an attacker the ability to poison users with malware, steal confidential data, or remove services through remote code execution.
The good news is that ManageEngine has already released updates that fix this vulnerability. It is important that all users patch their systems with the latest update immediately. Despite this, CISA has stated that they “are aware of malicious cyber actors exploiting this vulnerability in active attacks.”
CISA issued an alert that covers several different mitigation measures that users can take. These include applying the patch, disabling unnecessary services, ensuring that antivirus is up-to-date, monitoring for unusual network traffic, and assessing the affected system for suspicious files.
ManageEngine is a popular IT management and automation software with millions of users around the world. It provides services such as network, system, and mail server management, asset and configuration management, application and performance monitoring, enterprise service desk, and patch management.
It is important for users to keep their systems patched and up-to-date to stay protected against malicious cyber actors and exploits. CISA recommends that users of ManageEngine products patch their systems to reduce their risk of exploitation.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Mon, 23 Jan 2023 18:57:29 +0000