An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.
References
Link | Resource |
---|---|
https://www.manageengine.com/products/asset-explorer/sp-readme.html | Release Notes Vendor Advisory |
http://seclists.org/fulldisclosure/2020/May/29 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-03-23 10:15
Updated : 2022-10-07 07:14
NVD link : CVE-2020-8838
Mitre link : CVE-2020-8838
JSON object : View
CWE
CWE-354
Improper Validation of Integrity Check Value
Products Affected
zohocorp
- manageengine_assetexplorer