Lucene search

K
nvd[email protected]NVD:CVE-2021-44651
HistoryJan 12, 2022 - 3:15 p.m.

CVE-2021-44651

2022-01-1215:15:07
CWE-434
web.nvd.nist.gov
3
zoho manageengine
cloudsecurityplus
remote code execution
vulnerability
cve-2021-44651
updatepersonalizesettings
improper security patch
cve-2021-40175

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.084

Percentile

94.4%

Zoho ManageEngine CloudSecurityPlus before Build 4117 allows remote code execution through the updatePersonalizeSettings component due to an improper security patch for CVE-2021-40175.

Affected configurations

Nvd
Node
zohocorpmanageengine_cloud_security_plusRange<4.1
OR
zohocorpmanageengine_cloud_security_plusMatch4.1-
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4110
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4111
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4112
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4113
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4115
OR
zohocorpmanageengine_cloud_security_plusMatch4.1build4116
Node
zohocorplog360Range5.2.2
OR
zohocorpmanageengine_cloud_security_plusRange4.1.1.7
VendorProductVersionCPE
zohocorpmanageengine_cloud_security_plus*cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:*:*:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:-:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4110:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4111:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4112:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4113:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4115:*:*:*:*:*:*
zohocorpmanageengine_cloud_security_plus4.1cpe:2.3:a:zohocorp:manageengine_cloud_security_plus:4.1:build4116:*:*:*:*:*:*
zohocorplog360*cpe:2.3:a:zohocorp:log360:*:*:*:*:*:*:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.084

Percentile

94.4%

Related for NVD:CVE-2021-44651