First published: Fri Aug 04 2017(Updated: )
Zoho ManageEngine OpManager 11 through 12.2 uses a custom encryption algorithm to protect the credential used to access the monitored devices. The implemented algorithm doesn't use a per-system key or even a salt; therefore, it's possible to create a universal decryptor.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine OpManager MSP | =11.0 | |
ManageEngine OpManager MSP | =11.1 | |
ManageEngine OpManager MSP | =11.2 | |
ManageEngine OpManager MSP | =11.3 | |
ManageEngine OpManager MSP | =11.4 | |
ManageEngine OpManager MSP | =11.5 | |
ManageEngine OpManager MSP | =11.6 | |
ManageEngine OpManager MSP | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-9107 is a vulnerability in Zoho ManageEngine OpManager versions 11.0 to 12.2 that uses a custom encryption algorithm without a per-system key or salt, allowing the creation of a universal decryptor for credentials.
The severity of CVE-2015-9107 is classified as critical because it allows unauthorized access to sensitive credentials.
To fix CVE-2015-9107, it is recommended to upgrade to a later version of Zoho ManageEngine OpManager that addresses this vulnerability.
CVE-2015-9107 affects ManageEngine OpManager versions from 11.0 to 12.2.
If you cannot upgrade due to CVE-2015-9107, consider implementing additional security measures such as restricting access and monitoring for suspicious activity.