CVE-2020-8838

An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/May/29 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/May/29 - Exploit, Mailing List, Third Party Advisory
References () https://www.manageengine.com/products/asset-explorer/sp-readme.html - Release Notes, Vendor Advisory () https://www.manageengine.com/products/asset-explorer/sp-readme.html - Release Notes, Vendor Advisory

Information

Published : 2020-03-23 17:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8838

Mitre link : CVE-2020-8838

CVE.ORG link : CVE-2020-8838


JSON object : View

Products Affected

zohocorp

  • manageengine_assetexplorer
CWE
CWE-354

Improper Validation of Integrity Check Value