7.8
CVE-2019-12133
- EPSS 0.06%
- Published 18.06.2019 22:15:12
- Last modified 21.11.2024 04:22:17
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
Data is provided by the National Vulnerability Database (NVD)
Zohocorp ≫ Manageengine Analytics Plus Version1.0
Zohocorp ≫ Manageengine Browser Security Plus Version-
Zohocorp ≫ Manageengine Desktop Central Version10.0.380
Zohocorp ≫ Manageengine Eventlog Analyzer Version12.0.2
Zohocorp ≫ Manageengine Firewall Version12.0
Zohocorp ≫ Manageengine Key Manager Plus Version5.6
Zohocorp ≫ Manageengine Mobile Device Manager Plus Version9.0.0
Zohocorp ≫ Manageengine Netflow Analyzer Version11.0
Zohocorp ≫ Manageengine Network Configuration Manager Version11.0
Zohocorp ≫ Manageengine O365 Manager Plus Version4.0
Zohocorp ≫ Manageengine Opmanager Version12.3
Zohocorp ≫ Manageengine Oputils Version11.0
Zohocorp ≫ Manageengine Password Manager Pro Version9.9
Zohocorp ≫ Manageengine Patch Connect Plus Version9.0.0
Zohocorp ≫ Manageengine Patch Manager Plus Version9.0.0
Zohocorp ≫ Manageengine Servicedesk Plus Version10.0.0
Zohocorp ≫ Manageengine Supportcenter Plus Version8.1
Zohocorp ≫ Manageengine Vulnerability Manager Plus Version9.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.172 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.