Skip to content

Critical Account Takeover Vulnerability in Zoho ManageEngine ADSelfService Plus (CVE-2025-1723)

Critical Account Takeover Vulnerability in Zoho ManageEngine ADSelfService Plus (CVE-2025-1723)
Critical Vulnerability in Zoho ManageEngine ADSelfService Plus: Protect Your Accounts Now
3:37

On March 5, 2025, Zoho Corporation released an urgent security advisory highlighting a severe vulnerability impacting ManageEngine ADSelfService Plus, a widely used identity security platform. This flaw, identified as CVE-2025-1723, carries a severity level of 8 out of 10, indicating high potential risk for organizations using versions 6510 or below.

Understanding the Vulnerability: What Exactly Went Wrong?

Zoho ManageEngine ADSelfService Plus simplifies password management and account self-service tasks, helping organizations streamline identity and access management. However, the newly discovered vulnerability stems from improper session handling within the application. Specifically, authenticated users—those already granted access within your organization—can exploit session management errors to gain unauthorized access to other users’ accounts, leading to potential account takeovers.

This kind of session mishandling vulnerability is particularly troubling. It opens doors for internal threat actors or compromised credentials to escalate their privileges, accessing sensitive data and services without detection.

Who Is at Risk?

Organizations using ADSelfService Plus versions 6510 and earlier must prioritize immediate action. This vulnerability does not discriminate; any organization leveraging vulnerable software could potentially suffer from unauthorized data exposure, account compromise, and consequential reputational damage.

Potential Impact on Businesses

Ignoring or delaying the patching of this critical vulnerability could have severe consequences:

  • Account Takeover: Malicious insiders or compromised credentials can access and control other users' accounts.

  • Data Breaches: Sensitive employee and corporate data, including personal and proprietary information, could be exposed.

  • Operational Disruptions: Unauthorized access can disrupt normal business processes, leading to downtime and loss of productivity.

  • Reputation Damage: Trust is fragile. Data breaches and account takeovers significantly impact customer and stakeholder trust, damaging your organization's brand.

How to Protect Your Organization

Zoho Corporation has already addressed the vulnerability with necessary security patches. Gradient Cyber strongly recommends the following immediate actions:

  1. Apply the Latest Security Updates: Immediately upgrade to ADSelfService Plus version higher than 6510. The official patches provided by Zoho resolve the session management issue.

  2. Review Your Security Policies: Conduct a thorough review of your session and credential management practices. Strengthen session timeout and re-authentication policies to mitigate future risks.

  3. Continuous Monitoring: Implement robust monitoring and detection mechanisms. Early detection is critical to minimize damage from unauthorized activities.

Stay Ahead of Emerging Threats

Security threats evolve continually, and timely updates are crucial. Organizations should cultivate a culture of proactive cybersecurity, including regular audits, employee training, and staying informed about vulnerabilities through trusted security advisories.

Next Steps

Gradient Cyber is dedicated to helping organizations secure their environments against rapidly evolving cyber threats. For more information or assistance in managing cybersecurity risks, visit our security advisory page or contact our team directly.

Stay secure, stay informed, and take swift action today.

Stay in the loop with the latest threat intelligence