:content
[{:type :element,
:attrs
{:class "tip-intro", :style "font-size: 15px;"},
:tag :p,
:content
[{:type :element,
:attrs nil,
:tag :em,
:content
["This Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8. See the "
{:type :element,
:attrs
{:href
"
https://attack.mitre.org/versions/v9/techniques/enterprise/"},
:tag :a,
:content ["ATT&CK for Enterprise"]}
" for referenced threat actor tactics and for techniques."]}]}
"\n\n"
{:type :element,
:attrs nil,
:tag :p,
:content
["This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), United States Coast Guard Cyber Command (CGCYBER), and the Cybersecurity and Infrastructure Security Agency (CISA) to highlight the cyber threat associated with active exploitation of a newly identified vulnerability (CVE-2021-40539) in ManageEngine ADSelfService Plus—a self-service password management and single sign-on solution."]}
"\n\n"
{:type :element,
:attrs nil,
:tag :p,
:content
["CVE-2021-40539, rated critical by the Common Vulnerability Scoring System (CVSS), is an authentication bypass vulnerability affecting representational state transfer (REST) application programming interface (API) URLs that could enable remote code execution. The FBI, CISA, and CGCYBER assess that advanced persistent threat (APT) cyber actors are likely among those exploiting the vulnerability. The exploitation of ManageEngine ADSelfService Plus poses a serious risk to critical infrastructure companies, U.S.-cleared defense contractors, academic institutions, and other entities that use the software. Successful exploitation of the vulnerability allows an attacker to place webshells, which enable the adversary to conduct post-exploitation activities, such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files."]}
"\n\n"