WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Joint Cybersecurity Advisory: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Joint Cybersecurity Advisory: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus

Author: Alec Davison

Created: Friday, December 3, 2021 - 17:06

Categories: Cybersecurity

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI just released a joint cybersecurity advisory highlighting the cyber threat associated with active exploitation of a newly identified vulnerability, tracked as CVE-2021-44077, in Zoho ManageEngine ServiceDesk Plus, an IT help desk software with asset management. According to the report, the CVE-2021-44077 vulnerability is an unauthenticated remote code execution (RCE) vulnerability impacting all ServiceDesk Plus versions up to, and including, version 11305. The FBI and CISA assess that advanced persistent threat (APT) cyber actors are among those exploiting the vulnerability. An attack successfully leveraging this vulnerability can “upload executable files and place webshells, which enable the adversary to conduct post-exploitation activities, such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files,” according to the advisory.

A patch for this vulnerability was released on September 16, 2021, along with a security advisory. Additionally, the FBI and CISA are aware of threat actors likely abusing this exploit in the wild. The advisory includes further technical details regarding the group’s activity, including indicators of compromise, and lists recommended mitigations. For any questions related to this report or to report an intrusion and request resources for incident response or technical assistance, contact CISA at (888) 282-0870, or by email at Ce*****@******hs.gov. Additionally, to report suspicious or criminal activity related to information found in this advisory, contact your local FBI field office, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855)-292-3937, or by e-mail at Cy*****@*bi.gov.

Attached Files:

AA21-336A_APT_Actors_Exploiting_CVE-2021-44077_in_Zoho_ManageEngine_ServiceDesk_Plus_Final_Draft_02DEC2021

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar