CVE-2022-47966

Vulnerability updated 23 days ago (2024-11-29T14:09:26.235Z)
Download STIX
Preview STIX
CVE-2022-47966 is a critical vulnerability discovered in Zoho ManageEngine ServiceDesk Plus, a widely used IT management software. The flaw was exploited by malicious actors to gain unauthorized access to the organization's systems and networks. The exploitation started just five days after proof-of-concepts (PoCs) for the exploit were publicly disclosed. The threat actors utilized this vulnerability to deliver and deploy a newer malware threat known as "QuiteRAT," which shares many capabilities with the Lazarus Group's MagicRAT malware but has a significantly smaller file size. This vulnerability had a Kenna risk score of 100 out of 100, indicating its high severity. The Peach Sandstorm Advanced Persistent Threat (APT) group was observed attempting to exploit this vulnerability along with another in Atlassian Confluence (CVE-2022-26134) to infiltrate target environments. In 2022, two exploits of the Zoho ManageEngine flaw (CVE-2022-47966) and one ProxyNotShell (CVE-2022-41080, -41082) sample were seen. Remote exploitation of vulnerable applications was a common attack method used by Peach Sandstorm, targeting known remote code execution (RCE) vulnerabilities in both Zoho ManageEngine and Atlas Confluence to gain initial access. North Korea's Lazarus Group and an unknown group that targeted a U.S. aeronautical organization also abused the Zoho ManageEngine vulnerability (CVE-2022-47966). In some instances, threat actors favored exploiting vulnerabilities over password spraying, specifically targeting RCE bugs in Zoho ManageEngine and Confluence. Protection against these threats, including the Zoho ManageEngine Remote Code Execution (CVE-2022-47966), was provided by Check Point IPS. The advisory noted that nation-state APT groups exploited this vulnerability to gain unauthorized access to the organization’s Zoho ManageEngine ServiceDesk Plus instance, subsequently moving laterally through its network.
Description last updated: 2024-03-15T01:16:28.465Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Manageengine
Vulnerability
Exploit
Remote Code ...
Confluence
Apt
RCE (Remote ...
Fortinet
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Conti Malware is associated with CVE-2022-47966. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personahas used
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Peach Sandstorm Threat Actor is associated with CVE-2022-47966. Peach Sandstorm, also known as Curious Serpens, APT33, Elfin, HOLMIUM, MAGNALIUM, or REFINED KITTEN, is a threat actor linked to the Iranian Islamic Revolutionary Guard Corps (IRGC). Active since at least 2013, this espionage group has primarily targeted aerospace and energy sectors, alongside goverhas used
3
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The CVE-2022-26134 Vulnerability is associated with CVE-2022-47966. CVE-2022-26134 is a critical software vulnerability that was discovered in Atlassian Confluence Server and Data Center. This flaw, which allows for remote code execution (RCE), was publicly disclosed by Atlassian in June 2022. The Cybersecurity and Infrastructure Security Agency (CISA) recognized thUnspecified
3
The CVE-2022-42475 Vulnerability is associated with CVE-2022-47966. The critical zero-day vulnerability, CVE-2022-42475, was discovered in FortiGate firewalls during an incident investigation by the vendor. This flaw in software design or implementation allows an unauthenticated attacker to execute arbitrary code on affected systems. The vulnerability is present in Unspecified
2
Source Document References
Information about the CVE-2022-47966 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CISA
a month ago
CISA
5 months ago
DARKReading
9 months ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
DARKReading
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
DARKReading
a year ago
Checkpoint
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago