Zoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the Remote Access Plus Server Admin account.
References
Link | Resource |
---|---|
https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6 | Exploit Third Party Advisory |
https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.3 |
Information
Published : 2021-11-17 13:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-42955
Mitre link : CVE-2021-42955
CVE.ORG link : CVE-2021-42955
JSON object : View
Products Affected
zohocorp
- manageengine_remote_access_plus
microsoft
- windows
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource