• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Linux security Mac security Windows security

Desktop Central vulnerability allows authentication bypass, Patch now!

John Greenwood Posted On January 18, 2022
0



Desktop Central vulnerability

The leading software maker ManageEngine, a div of Zoho Corp has released patches for a critical security vulnerability that existed in its endpoint management software Desktop Central and Desktop Central MSP.

The security vulnerability will allow a remote actor to exploit it and execute remote operations to gain unauthorized access to its affected servers.

Details on the Desktop Central Vulnerability

The Desktop Central vulnerability is tracked as CVE-2021-4457, and allows authentication bypass that will give privilege for attackers to read unauthorized information or write an arbitrary zip file on the server. The company stated that the vulnerability is critical and is best to patch the same immediately.

Osword from SGLAB of Legendsec at Qi’anxin Group is the one wo discovered and reported the vulnerability. ManageEngine said the patched version will be 10.1.2127.9.

ManageEngine has addressed multiple vulnerabilities in recent months which includes,

  • CVE-2021-40539 with a CVSS score of 9.8, authentication bypass vulnerability affecting ManageEngine AD SelfService Plus.
  • CVE-2021-44515 with a CVSS score of 9.8, authentication bypass vulnerability affecting ManageEngine Desktop Central
  • CVE-2021-44077 with a CVSS score of 9.8, unauthenticated remote code execution vulnerability in ManageEngine ServiceDesk Plus and SupportCenter Plus.

Desktop Central instances have been exploited in the past by attackers as the remote monitoring and management tools are a sweet spot for hackers to breach into high-profile targets. As per the KELA analysis and study on Desktop Central in 2020, the following two victims was identified,

KELA managed to identify the victims and indirectly confirm they were using the software in question. The first target is a Turkish company with a revenue of $221 Million (the access cost 1.5 BTC). The second victim is a Canadian corporation with a revenue of $338 Million, whose access has been sold in a few hours – it was offered for 1 BTC. -KELA report.

A Shodan search revealed that around 2800 Desktop Central servers could be exposed to wild attacks if not patched immediately.

Desktop Central vulnerability
Source: KELA Report

So it is best to update ManageEngine Desktop Central patches immediately to ensure your network and the data are safe from threat actors that could soon start exploiting this vulnerability in the wild. Thanks to the company for handling the vulnerability early and giving a fix to the exploitation.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


Desktop Central security vulnerabilityDesktop Central vulnerabilityManageEngine Desktop Central vulnerability


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search