ManageEngine ADSelfServicePlus Authentication Bypass (CVE-2021-40539)

critical Nessus Plugin ID 154964


An Active Directory password management and single-sign on solution application running on the remote host is affected by an authentication bypass vulnerability.


The Zoho ManageEngine ADSelfService Plus running on the remote host is affected by an authentication bypass vulnerability in the REST API which can lead to remote code execution.


Upgrade to ADSelfService Plus build 6113 or later.

See Also

Plugin Details

Severity: Critical

ID: 154964

File Name: manageengine_adselfservice_plus_CVE-2021-40539.nbin

Version: 1.15

Type: remote

Family: CGI abuses

Published: 11/8/2021

Updated: 5/24/2022

Risk Information

CVSS Score Source: CVE-2021-40539


Risk Factor: Critical

Score: 9.8


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_adselfservice_plus

Required KB Items: installed_sw/ManageEngine ADSelfService Plus

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/7/2021

Vulnerability Publication Date: 9/7/2021

CISA Known Exploited Dates: 11/17/2021

Exploitable With

Metasploit (ManageEngine ADSelfService Plus CVE-2021-40539)

Reference Information

CVE: CVE-2021-40539

IAVA: 2021-A-0561