Security News > 2020 > August > Critical ManageEngine ADSelfService Plus RCE flaw patched

A critical vulnerability in ManageEngine ADSelfService Plus, an Active Directory password-reset solution, could allow attackers to remotely execute commands with system level privileges on the target Windows host.
ManageEngine ADSelfService Plus is developed by ManageEngine, a division of Zoho Corporation, a software development company that focuses on web-based business tools and information technology.
"ADSelfService Plus supports self-service password reset for WFH and remote users by enabling users to reset Windows password from their own machines and updating the cached credentials through a VPN client," the company touts.
"A security alert can/will be triggered when 'an unauthenticated attacker having physical access to the host issues a self-signed SSLcertificate to the client'. Or, 'a self-signed SSLcertificate is configured on ADSelfService Plus server'," he noted.
Admins are advised to upgrade to ADSelfService Plus build 6003, which contains the complete security fix.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/kEOwg1VLhWc/
Related news
- Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication (source)
- Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability (source)
- Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (source)
- Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (source)
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- Critical Langflow RCE flaw exploited to hack AI app servers (source)
- SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version (source)