INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h
Vulnerabilities

CVE-2021-37415

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability — Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authe
Published: Dec 1, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability — Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication

🤖 AI Executive Summary

Zoho ManageEngine ServiceDesk Plus versions before 11302 contain a critical authentication bypass vulnerability affecting REST API endpoints, allowing unauthenticated access to sensitive functionality. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to organizations using vulnerable versions. Immediate patching is essential to prevent unauthorized access to ticketing systems, customer data, and IT infrastructure management interfaces.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 04:55
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors are at significant risk. Government agencies and NCA-regulated entities using ServiceDesk Plus for IT service management face potential exposure of sensitive administrative data and audit trails. Banking sector institutions (SAMA-regulated) using this platform risk unauthorized access to IT infrastructure supporting financial systems. Healthcare organizations may expose patient-related IT service records. Telecommunications providers (STC, Mobily) and energy sector entities (ARAMCO, SEC) relying on ServiceDesk Plus for IT operations face potential disruption and data exfiltration. The vulnerability's authentication bypass nature makes it particularly dangerous in Saudi's interconnected critical infrastructure environment.
🏢 Affected Saudi Sectors
Government and Public Administration Banking and Financial Services Healthcare and Medical Services Energy and Utilities Telecommunications Critical Infrastructure Education Large Enterprises
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all instances of Zoho ManageEngine ServiceDesk Plus in your environment and document current versions
2. Isolate vulnerable instances from external network access immediately if patching cannot be completed within 24 hours
3. Review access logs for REST API endpoints (particularly /api/v3/ paths) for suspicious unauthenticated requests
4. Check for indicators of compromise: unusual API calls, data exports, or configuration changes

PATCHING GUIDANCE:
1. Upgrade all ServiceDesk Plus installations to version 11302 or later immediately
2. Apply patches in a staged approach: test environment first, then production during maintenance windows
3. Verify patch application by checking version numbers and testing authentication requirements on REST endpoints
4. Review Zoho's security advisories for any additional mitigations

COMPENSATING CONTROLS (if immediate patching not possible):
1. Implement network-level access controls restricting ServiceDesk Plus REST API access to authorized IP ranges only
2. Deploy WAF rules blocking unauthenticated requests to /api/v3/ endpoints
3. Enable detailed logging and monitoring of all API access attempts
4. Implement rate limiting on API endpoints
5. Disable unnecessary REST API endpoints if business requirements allow

DETECTION RULES:
1. Monitor for HTTP requests to /api/v3/* endpoints without valid authentication tokens
2. Alert on successful API responses (HTTP 200) to REST endpoints from unauthenticated sources
3. Track unusual patterns in API endpoint access (bulk data retrieval, configuration changes)
4. Monitor for POST/PUT requests to sensitive endpoints like /api/v3/tickets, /api/v3/users, /api/v3/assets
5. Implement SIEM rules correlating multiple failed authentication attempts followed by successful unauthenticated API calls
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حدد جميع نسخ Zoho ManageEngine ServiceDesk Plus في بيئتك وقم بتوثيق الإصدارات الحالية
2. عزل النسخ الضعيفة عن الوصول الخارجي للشبكة فوراً إذا لم يكن التصحيح ممكناً خلال 24 ساعة
3. راجع سجلات الوصول لنقاط نهاية REST API (خاصة مسارات /api/v3/) للطلبات المريبة غير المصرح بها
4. تحقق من مؤشرات الاختراق: استدعاءات API غير عادية أو تصدير البيانات أو تغييرات التكوين

إرشادات التصحيح:
1. قم بترقية جميع تثبيتات ServiceDesk Plus إلى الإصدار 11302 أو أحدث فوراً
2. طبق التصحيحات بطريقة مرحلية: بيئة الاختبار أولاً، ثم الإنتاج أثناء نوافذ الصيانة
3. تحقق من تطبيق التصحيح بفحص أرقام الإصدارات واختبار متطلبات المصادقة على نقاط النهاية
4. راجع استشارات أمان Zoho للحصول على أي تخفيفات إضافية

الضوابط البديلة (إذا لم يكن التصحيح الفوري ممكناً):
1. تطبيق ضوابط الوصول على مستوى الشبكة لتقييد وصول REST API لـ ServiceDesk Plus إلى نطاقات IP المصرح بها فقط
2. نشر قواعد WAF لحجب الطلبات غير المصرح بها إلى نقاط النهاية /api/v3/
3. تفعيل السجلات التفصيلية ومراقبة جميع محاولات الوصول إلى API
4. تطبيق تحديد معدل على نقاط نهاية API
5. تعطيل نقاط نهاية REST API غير الضرورية إذا سمحت متطلبات العمل

قواعد الكشف:
1. مراقبة طلبات HTTP إلى نقاط النهاية /api/v3/* بدون رموز مصادقة صحيحة
2. تنبيه الاستجابات الناجحة (HTTP 200) لنقاط النهاية من مصادر غير مصرح بها
3. تتبع الأنماط غير العادية في وصول نقاط النهاية (استرجاع البيانات بكميات كبيرة وتغييرات التكوين)
4. مراقبة طلبات POST/PUT إلى نقاط النهاية الحساسة مثل /api/v3/tickets و /api/v3/users و /api/v3/assets
5. تطبيق قواعد SIEM التي تربط محاولات المصادقة الفاشلة المتعددة متبوعة باستدعاءات API غير مصرح بها ناجحة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 - Access Control and Authentication 5.1.2 - User Access Management 5.2.1 - Information Security Policies 5.3.1 - Cryptography and Encryption 5.4.1 - Logging and Monitoring 5.4.2 - Security Event Management
🔵 SAMA CSF
ID.AM-1 - Asset Management PR.AC-1 - Access Control PR.AC-2 - Physical and Logical Access DE.CM-1 - Detection and Analysis DE.AE-1 - Anomalies and Events RS.MI-1 - Incident Response
🟡 ISO 27001:2022
A.5.1.1 - Policies for information security A.6.1.1 - Information security roles and responsibilities A.8.1.1 - User endpoint devices A.9.1.1 - Access control policy A.9.2.1 - User registration and de-registration A.9.4.1 - Password management A.12.4.1 - Event logging A.12.4.3 - Protection of log information
🟣 PCI DSS v4.0
Requirement 2.1 - Default security parameters Requirement 6.2 - Security patches Requirement 7.1 - Access control Requirement 8.1 - User identification Requirement 10.2 - Logging and monitoring
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Zoho:ManageEngine ServiceDesk Plus (SDP)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS91.97%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2021-12-15
Published 2021-12-01
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.