#VU31933 Improper Authentication in Zoho ManageEngine Desktop Central


Published: 2020-10-10

Vulnerability identifier: #VU31933

Vulnerability risk: High

CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-15589

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Zoho ManageEngine Desktop Central
Universal components / Libraries / Software for developers

Vendor: Zoho Corporation

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests in agent-server communication in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate functions within the client application. An attacker controlled server can force the client application to skip TLS certificate validation and perform a MitM attack or compromise the affected system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Zoho ManageEngine Desktop Central: 10.0.500 - 10.0.555


External links
http://www.manageengine.com/products/desktop-central/hotfix-readme1.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability