CVE-2022-28810

Published Apr 18, 2022

Last updated a year ago

Overview

Description
Zoho ManageEngine ADSelfService Plus before build 6122 allows a remote authenticated administrator to execute arbitrary operating OS commands as SYSTEM via the policy custom script feature. Due to the use of a default administrator password, attackers may be able to abuse this functionality with minimal effort. Additionally, a remote and partially authenticated attacker may be able to inject arbitrary commands into the custom script due to an unsanitized password field.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
6.8
Impact score
5.9
Exploitability score
0.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
7.1
Impact score
10
Exploitability score
3.9
Vector string
AV:N/AC:H/Au:S/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability
Exploit added on
Mar 7, 2023
Exploit action due
Mar 28, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-78

Social media

Hype score
Not currently trending

Configurations