""ET EXPLOIT Zoho ManagedEngine Desktop Central Authentication Bypass - Administrator Password Reset Attempt (CVE-2021-44515)""

SID: 2034958

Revision: 1

Class Type: attempted-admin

Metadata: attack_target Server, created_at 2022_01_24, cve CVE_2021_44515, deployment Perimeter, deployment Internal, signature_severity Major, tag Exploit, updated_at 2022_01_24, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application

Reference:

  • cve

  • 2021-44515

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/STATE_ID/" Depth: 10

  • Value: "/changeDefaultAmazonPassword?"

  • Value: "loginName="

  • Value: "newUserPassword="

  • Value: "STATE_COOKIE="

Within:

PCRE:

Special Options:

  • http_method

  • http_uri

  • http_uri

  • fast_pattern

  • http_uri

  • http_uri

  • http_cookie

source