Skip to main content

CVE-2022-42904: n/a in n/a

High
VulnerabilityCVE-2022-42904cvecve-2022-42904
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Zoho ManageEngine ADManager Plus through 7151 allows authenticated admin users to execute the commands in proxy settings.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:54:51 UTC

Technical Analysis

CVE-2022-42904 is a high-severity vulnerability affecting Zoho ManageEngine ADManager Plus, specifically versions up to 7151. This vulnerability allows authenticated administrative users to execute arbitrary commands via the proxy settings functionality. The vulnerability is classified under CWE-77, which relates to Improper Neutralization of Special Elements used in a Command ('Command Injection'). The CVSS v3.1 score is 7.2, indicating a high severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker with admin credentials can execute commands that could compromise the entire system. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk because it allows command execution through a trusted administrative interface. This could lead to full system compromise, data exfiltration, or disruption of services managed by ADManager Plus. The lack of patch links in the provided data suggests that organizations should verify with Zoho for updates or mitigations. The vulnerability's presence in a widely used Active Directory management tool increases its attractiveness to attackers targeting enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2022-42904 can be substantial. ADManager Plus is commonly used in enterprise environments to manage Active Directory, which is critical for identity and access management. Exploitation could allow attackers to execute arbitrary commands with administrative privileges, potentially leading to unauthorized access to sensitive data, disruption of directory services, and lateral movement within corporate networks. This could result in data breaches, operational downtime, and compliance violations under regulations such as GDPR. The high integrity and availability impact means that business-critical services relying on Active Directory could be disrupted, affecting productivity and trust. Given the centralized role of ADManager Plus in user and permission management, exploitation could also facilitate privilege escalation and persistent access, complicating incident response and remediation efforts.

Mitigation Recommendations

Organizations should immediately verify the version of Zoho ManageEngine ADManager Plus in use and consult Zoho's official security advisories for patches or updates addressing CVE-2022-42904. Until patches are applied, restrict administrative access to the ADManager Plus interface to trusted personnel and secure network segments. Implement strict network segmentation and firewall rules to limit access to the management console. Enable detailed logging and monitoring of administrative actions and proxy settings changes to detect suspicious activity. Consider employing application-layer firewalls or intrusion detection systems to identify anomalous command execution attempts. Additionally, review and enforce the principle of least privilege for administrative accounts to minimize the risk of exploitation. Regularly audit proxy settings and configurations to detect unauthorized modifications. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee23e

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:54:51 AM

Last updated: 7/30/2025, 1:45:58 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats