Vulnerability Description
Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zohocorp | Manageengine Access Manager Plus | 4.0 |
| Zohocorp | Manageengine Pam360 | 4.0 |
| Zohocorp | Manageengine Password Manager Pro | 10.1 |
Related Weaknesses (CWE)
References
- https://www.manageengine.com/privileged-session-management/advisory/cve-2022-290Vendor Advisory
- https://www.tenable.com/security/research/tra-2022-14ExploitThird Party Advisory
- https://www.manageengine.com/privileged-session-management/advisory/cve-2022-290Vendor Advisory
- https://www.tenable.com/security/research/tra-2022-14ExploitThird Party Advisory
FAQ
What is CVE-2022-29081?
CVE-2022-29081 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction....
How severe is CVE-2022-29081?
CVE-2022-29081 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-29081?
Check the references section above for vendor advisories and patch information. Affected products include: Zohocorp Manageengine Access Manager Plus, Zohocorp Manageengine Pam360, Zohocorp Manageengine Password Manager Pro.