- Description
- ManageEngine ADSelfService Plus versions 6401 and below are vulnerable to the remote code execution due to the improper handling in the load balancer component. Authentication is required in order to exploit this vulnerability.
- Source
- 0fc0942c-577d-436f-ae8e-945763c79b02
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 0fc0942c-577d-436f-ae8e-945763c79b02
- CWE-94
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0B9A77AF-9D42-42A2-84F3-4307E46D917F",
"versionEndExcluding": "6.4"
},
{
"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.4:6400:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0FCE8818-79BB-41F7-9D2E-43FEE698B325"
},
{
"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.4:6401:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC18D7BD-91CC-4019-B429-BBA4353E8984"
}
],
"operator": "OR"
}
]
}
]