5.3
CVE-2021-20147
- EPSS 6.87%
- Published 03.01.2022 22:15:08
- Last modified 21.11.2024 05:46:00
- Source vulnreport@tenable.com
- Teams watchlist Login
- Open Login
ManageEngine ADSelfService Plus below build 6116 contains an observable response discrepancy in the UMCP operation of the ChangePasswordAPI. This allows an unauthenticated remote attacker to determine whether a Windows domain user exists.
Data is provided by the National Vulnerability Database (NVD)
Zohocorp ≫ Manageengine Adselfservice Plus Version <= 6.0
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update-
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6100
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6101
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6102
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6103
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6104
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6105
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6106
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6107
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6108
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6109
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6110
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6111
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6112
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6113
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6114
Zohocorp ≫ Manageengine Adselfservice Plus Version6.1 Update6115
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 6.87% | 0.904 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-203 Observable Discrepancy
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.