CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
94.0%
Zoho ManageEngine ADSelfService Plus through 6113 has an authentication bypass that can be exploited to steal the domain controller session token for identity spoofing, thereby achieving the privileges of the domain controller administrator. NOTE: the vendor’s perspective is that they have “found no evidence or detail of a security vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
zohocorp | manageengine_adselfservice_plus | * | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:-:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6100:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6101:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6102:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6103:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6104:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6105:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6106:*:*:*:*:*:* |
zohocorp | manageengine_adselfservice_plus | 6.1 | cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6107:*:*:*:*:*:* |