This document addresses an authentication bypass vulnerability (CVE-2021-44515) in ManageEngine Desktop Central and provides an incident response plan if your system is affected.
Vulnerability ID: CVE-2021-44515
Severity: Critical
Update Release Date: 3rd December 2021
Fix Build:
i) For Enterprise-
For builds 10.1.2127.17 and below, upgrade to 10.1.2127.18 (SHA-256 Checksum: b4700d72fba9248d88f6ec68e9338129954e78ee701eb0e9965a35d40b78ea7a )
For builds 10.1.2128.0 to 10.1.2137.2, upgrade to 10.1.2137.3 (SHA-256 Checksum:40950a5ebc78ae3bef8792e3fc6f8055b28906d053cf703bb3464945110d09ae)
ii) For MSP-
For builds 10.1.2127.17 and below, upgrade to 10.1.2127.18 (SHA-256 Checksum: fa40fce1028bd4bd948190f30967d502aa9f5dabe184caab7af508e9881f5459 )
For builds 10.1.2128.0 to 10.1.2137.2, upgrade to 10.1.2137.3 (SHA-256 Checksum: 5f0a13a5dd5c5821bbc6b6209b3ab707f6d4af65bea4474d2786119f07ab1f65 )
An authentication bypass vulnerability in ManageEngine Desktop Central was identified and the vulnerability can allow an adversary to bypass authentication and execute arbitrary code in the Desktop Central server.
Note: As we are noticing indications of exploitation of this vulnerability, we strongly advise customers to update their installations to the latest build as soon as possible.
Here are some of the Indicators of Compromise (IOC) for this vulnerability (CVE 2021-44515):
1. Disconnect the affected system from your network.
2. Back up the Desktop Central database using these steps.
3. Format the compromised machine. Note: Before formatting the machine, ensure that you have backed up all critical business data.
4. Follow these steps to restore Desktop Central.
5. Mandatory step: Once the server is up and running, update Desktop Central to the latest build using the following steps:
i) Log in to your Desktop Central console, click on your current build number on the top right corner.
ii) You can find the latest build. Download the PPM and update.
Recommendation: Initiate a password reset for all services, accounts, Active Directory, etc. that has been accessed from the service installed machine. It is better if AD administrator passwords are also reset.
Mandatory step: Update Desktop Central to the latest build using the following steps:
i) Log in to your Desktop Central console, click on your current build number on the top right corner. ii) You can find the latest build. Download the PPM and update.Note: This vulnerability is not applicable to Desktop Central Cloud.
For further assistance, please contact endpointcentral-security@manageengine.com
Keywords: Security Updates, Vulnerabilities and Fixes, CVE-2021-44515, authentication bypass