CVE-2023-35854 Overview
CVE-2023-35854 is an authentication bypass vulnerability affecting Zoho ManageEngine ADSelfService Plus through build 6113. This vulnerability enables attackers to steal the domain controller session token for identity spoofing, ultimately achieving domain controller administrator privileges. The flaw represents a significant threat to enterprise Active Directory environments where ADSelfService Plus is deployed for self-service password management and single sign-on capabilities.
Critical Impact
Successful exploitation allows attackers to bypass authentication mechanisms and impersonate domain controller administrators, potentially leading to complete Active Directory domain compromise.
Affected Products
- Zoho ManageEngine ADSelfService Plus version 6.1 (all builds through 6113)
- Zoho ManageEngine ADSelfService Plus builds 6100 through 6112
- All prior versions of ManageEngine ADSelfService Plus
Discovery Timeline
- June 20, 2023 - CVE CVE-2023-35854 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2023-35854
Vulnerability Analysis
This authentication bypass vulnerability (CWE-306: Missing Authentication for Critical Function) allows remote attackers to circumvent the authentication mechanisms in ADSelfService Plus. The vulnerability can be exploited without any prior authentication or user interaction, making it particularly dangerous in network-accessible deployments.
The attack enables malicious actors to steal domain controller session tokens, which can then be used for identity spoofing. By leveraging these stolen tokens, attackers can effectively impersonate domain controller administrators and perform privileged operations within the Active Directory environment. This could include creating new administrative accounts, modifying group policies, extracting credential data, or establishing persistent backdoor access.
It is worth noting that Zoho has stated they have "found no evidence or detail of a security vulnerability," which creates uncertainty around the official patch status.
Root Cause
The vulnerability stems from missing authentication checks for critical functions within the ADSelfService Plus application. Specifically, the application fails to properly validate user authentication state before processing sensitive requests related to domain controller session management. This allows unauthenticated attackers to access functionality that should be restricted to authenticated administrators only.
Attack Vector
The attack vector is network-based, requiring no authentication or user interaction. An attacker with network access to a vulnerable ADSelfService Plus instance can exploit this vulnerability remotely. The attack workflow involves:
- Identifying a vulnerable ADSelfService Plus installation accessible over the network
- Crafting malicious requests to bypass authentication controls
- Extracting domain controller session tokens from the compromised application
- Using the stolen tokens to impersonate domain controller administrators
- Performing privileged operations within the Active Directory environment
Technical details regarding the specific exploitation methodology can be found in the GitHub PoC Repository referenced in external security research.
Detection Methods for CVE-2023-35854
Indicators of Compromise
- Unusual authentication patterns or session token requests to ADSelfService Plus endpoints without valid credentials
- Unexpected administrative actions within Active Directory originating from the ADSelfService Plus service account
- Anomalous network traffic to ADSelfService Plus from untrusted sources
- Suspicious domain controller authentication events correlated with ADSelfService Plus activity
Detection Strategies
- Monitor ADSelfService Plus application logs for authentication bypass attempts or unusual session token generation
- Implement network intrusion detection rules to identify exploitation attempts targeting ADSelfService Plus
- Configure Active Directory auditing to detect privilege escalation and unauthorized administrative actions
- Deploy endpoint detection and response (EDR) solutions to identify post-exploitation activities
Monitoring Recommendations
- Enable comprehensive logging on ADSelfService Plus instances and forward logs to a centralized SIEM
- Monitor for new administrative account creation or group policy modifications following ADSelfService Plus access
- Implement real-time alerting for domain controller administrator-level operations from unexpected sources
- Conduct regular reviews of ADSelfService Plus access logs and Active Directory security events
How to Mitigate CVE-2023-35854
Immediate Actions Required
- Restrict network access to ADSelfService Plus instances using firewall rules and network segmentation
- Implement additional authentication layers (such as VPN or reverse proxy with authentication) in front of ADSelfService Plus
- Monitor for exploitation attempts and suspicious administrative activities in Active Directory
- Review and audit all administrative actions performed through ADSelfService Plus recently
Patch Information
Zoho has stated they have found no evidence of a security vulnerability. Organizations should contact Zoho ManageEngine support directly to inquire about available security updates or hotfixes for builds 6113 and earlier. Refer to the ManageEngine Security Overview for official vendor security communications. Until official guidance is provided, implementing network-level mitigations is strongly recommended.
Workarounds
- Isolate ADSelfService Plus servers on a separate network segment with strict access controls
- Deploy a web application firewall (WAF) in front of ADSelfService Plus to filter malicious requests
- Limit administrative privileges of the ADSelfService Plus service account to the minimum required
- Consider temporarily disabling internet-facing access to ADSelfService Plus until a verified patch is available
# Network isolation example using iptables
# Restrict access to ADSelfService Plus to trusted management networks only
iptables -A INPUT -p tcp --dport 443 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
iptables -A INPUT -p tcp --dport 9251 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 9251 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


