First published: Mon Feb 19 2018(Updated: )
Remote Information Disclosure and Escalation of Privileges in ManageEngine Desktop Central MSP 10.0.137 allows attackers to download unencrypted XML files containing all data for configuration policies via a predictable /client-data/<client_id>/collections/##/usermgmt.xml URL, as demonstrated by passwords and Wi-Fi keys. This is fixed in build 100157.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Desktop Central | =10.0.137 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-16924 is critical with a CVSS score of 9.8.
The vulnerability in ManageEngine Desktop Central MSP 10.0.137 allows attackers to download unencrypted XML files containing all data for configuration policies.
An attacker can exploit CVE-2017-16924 by accessing a predictable URL to download unencrypted XML files.
To fix CVE-2017-16924, update ManageEngine Desktop Central MSP to a version that includes a patch for this vulnerability.
Yes, you can find additional information about CVE-2017-16924 in the references provided: [GitHub](https://github.com/snoonan77/security-research/blob/master/CVE-2017-16924) and [ManageEngine](https://www.manageengine.com/desktop-management-msp/password-encryption-policy-violation.html).