Zohocorp ManageEngine Desktop Central 10.0.137 Managed Service Providers Edition

CPE Details

Zohocorp ManageEngine Desktop Central 10.0.137 Managed Service Providers Edition
10.0.137
2018-03-12
17h09 +00:00
2021-08-06
16h10 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.137:*:*:*:managed_service_providers:*:*:*

Informations

Vendor

zohocorp

Product

manageengine_desktop_central

Version

10.0.137

Software Edition

managed_service_providers

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-48362 2023-02-25 00h00 +00:00 Zoho ManageEngine Desktop Central and Desktop Central MSP before 10.1.2137.2 allow directory traversal via computerName to AgentLogUploadServlet. A remote, authenticated attacker could upload arbitrary code that would be executed when Desktop Central is restarted. (The attacker could authenticate by exploiting CVE-2021-44515.)
8.8
Haute
CVE-2022-23779 2022-03-02 13h31 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
5.3
Moyen
CVE-2022-23863 2022-01-28 14h33 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.10 allows an authenticated user to change any user's login password.
6.5
Moyen
CVE-2021-44757 2022-01-18 08h21 +00:00 Zoho ManageEngine Desktop Central before 10.1.2137.9 and Desktop Central MSP before 10.1.2137.9 allow attackers to bypass authentication, and read sensitive information or upload an arbitrary ZIP archive to the server.
9.1
Critique
CVE-2021-46164 2022-01-08 23h26 +00:00 Zoho ManageEngine Desktop Central before 10.0.662 allows remote code execution by an authenticated user who has complete access to the Reports module.
8.8
Haute
CVE-2021-46165 2022-01-08 23h26 +00:00 Zoho ManageEngine Desktop Central before 10.0.662, during startup, launches an executable file from the batch files, but this file's path might not be properly defined.
7.8
Haute
CVE-2021-46166 2022-01-08 23h25 +00:00 Zoho ManageEngine Desktop Central before 10.0.662 allows authenticated users to obtain sensitive information from the database by visiting the Reports page.
6.5
Moyen
CVE-2021-44515 2021-12-12 04h04 +00:00 Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.
9.8
Critique
CVE-2021-37414 2021-09-10 12h27 +00:00 Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication.
7.5
Haute
CVE-2020-28050 2021-03-05 15h36 +00:00 Zoho ManageEngine Desktop Central before build 10.0.647 allows a single authentication secret from multiple agents to communicate with the server.
9.1
Critique
CVE-2020-15588 2020-07-29 15h35 +00:00 An issue was discovered in the client side of Zoho ManageEngine Desktop Central 10.0.552.W. An attacker-controlled server can trigger an integer overflow in InternetSendRequestEx and InternetSendRequestByBitrate that leads to a heap-based buffer overflow and Remote Code Execution with SYSTEM privileges. This issue will occur only when untrusted communication is initiated with server. In cloud, Agent will always connect with trusted communication.
9.8
Critique
CVE-2020-10859 2020-05-05 18h16 +00:00 Zoho ManageEngine Desktop Central before 10.0.484 allows authenticated arbitrary file writes during ZIP archive extraction via Directory Traversal in a crafted AppDependency API request.
6.5
Moyen
CVE-2020-8509 2020-03-30 15h50 +00:00 Zoho ManageEngine Desktop Central before 10.0.483 allows unauthenticated users to access PDFGenerationServlet, leading to sensitive information disclosure.
7.5
Haute
CVE-2020-8540 2020-03-11 15h15 +00:00 An XML external entity (XXE) vulnerability in Zoho ManageEngine Desktop Central before the 07-Mar-2020 update allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
9.8
Critique
CVE-2020-10189 2020-03-06 16h05 +00:00 Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
9.8
Critique
CVE-2018-13411 2018-09-12 14h00 +00:00 An issue was discovered in Zoho ManageEngine Desktop Central before 10.0.282. A clickable company logo in a window running as SYSTEM can be abused to escalate privileges. In cloud, the issue is fixed in 10.0.470 agent version.
8.8
Haute
CVE-2018-13412 2018-09-12 14h00 +00:00 An issue was discovered in the Self Service Portal in Zoho ManageEngine Desktop Central before 10.0.282. A clickable company logo in a window running as SYSTEM can be abused to escalate privileges. In cloud, the issue is fixed in 10.0.470 agent version.
7.8
Haute
CVE-2018-11716 2018-07-16 12h00 +00:00 An issue was discovered in Zoho ManageEngine Desktop Central before 100230. There is unauthenticated remote access to all log files of a Desktop Central instance containing critical information (private information such as location of enrolled devices, cleartext passwords, patching level, etc.) via a GET request on port 8022, 8443, or 8444.
9.8
Critique
CVE-2018-11717 2018-07-16 12h00 +00:00 An issue was discovered in Zoho ManageEngine Desktop Central before 100251. By leveraging access to a log file, a context-dependent attacker can obtain (depending on the modules configured) the Base64 encoded Password/Username of AD accounts, the cleartext Password/Username and mail settings of the EAS account (an AD account used to send mail), the cleartext password of recovery_password of Android devices, the cleartext password of account "set", the location of devices enrolled in the platform (with UUID and information related to the name of the person at the location), critical information about all enrolled devices such as Serial Number, UUID, Model, Name, and auth_session_token (usable to spoof a terminal identity on the platform), etc.
9.8
Critique
CVE-2017-16924 2018-02-19 03h00 +00:00 Remote Information Disclosure and Escalation of Privileges in ManageEngine Desktop Central MSP 10.0.137 allows attackers to download unencrypted XML files containing all data for configuration policies via a predictable /client-data//collections/##/usermgmt.xml URL, as demonstrated by passwords and Wi-Fi keys. This is fixed in build 100157.
9.8
Critique