Vulnerability Description
Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and execute all operations in the context of admin user.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zohocorp | Manageengine Adaudit Plus | < 6.0.3 |
| Zohocorp | Manageengine Datasecurity Plus | < 6.0.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-AutheExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/May/28ExploitMailing ListThird Party Advisory
- https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-pluPatchVendor Advisory
- http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-AutheExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/May/28ExploitMailing ListThird Party Advisory
- https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-pluPatchVendor Advisory
FAQ
What is CVE-2020-11532?
CVE-2020-11532 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and ex...
How severe is CVE-2020-11532?
CVE-2020-11532 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-11532?
Check the references section above for vendor advisories and patch information. Affected products include: Zohocorp Manageengine Adaudit Plus, Zohocorp Manageengine Datasecurity Plus.