7.5
Advisory Published
Updated

CVE-2020-11527

First published: Sat Apr 04 2020(Updated: )

In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
ManageEngine OpManager MSP<12.4
ManageEngine OpManager MSP=12.4
ManageEngine OpManager MSP=12.4-build124000
ManageEngine OpManager MSP=12.4-build124011
ManageEngine OpManager MSP=12.4-build124012
ManageEngine OpManager MSP=12.4-build124013
ManageEngine OpManager MSP=12.4-build124014
ManageEngine OpManager MSP=12.4-build124015
ManageEngine OpManager MSP=12.4-build124016
ManageEngine OpManager MSP=12.4-build124022
ManageEngine OpManager MSP=12.4-build124023
ManageEngine OpManager MSP=12.4-build124024
ManageEngine OpManager MSP=12.4-build124025
ManageEngine OpManager MSP=12.4-build124026
ManageEngine OpManager MSP=12.4-build124027
ManageEngine OpManager MSP=12.4-build124030
ManageEngine OpManager MSP=12.4-build124033
ManageEngine OpManager MSP=12.4-build124037
ManageEngine OpManager MSP=12.4-build124039
ManageEngine OpManager MSP=12.4-build124040
ManageEngine OpManager MSP=12.4-build124041
ManageEngine OpManager MSP=12.4-build124042
ManageEngine OpManager MSP=12.4-build124043
ManageEngine OpManager MSP=12.4-build124051
ManageEngine OpManager MSP=12.4-build124053
ManageEngine OpManager MSP=12.4-build124054
ManageEngine OpManager MSP=12.4-build124056
ManageEngine OpManager MSP=12.4-build124058
ManageEngine OpManager MSP=12.4-build124065
ManageEngine OpManager MSP=12.4-build124066
ManageEngine OpManager MSP=12.4-build124067
ManageEngine OpManager MSP=12.4-build124069
ManageEngine OpManager MSP=12.4-build124070
ManageEngine OpManager MSP=12.4-build124071
ManageEngine OpManager MSP=12.4-build124074
ManageEngine OpManager MSP=12.4-build124075
ManageEngine OpManager MSP=12.4-build124081
ManageEngine OpManager MSP=12.4-build124082
ManageEngine OpManager MSP=12.4-build124085
ManageEngine OpManager MSP=12.4-build124086
ManageEngine OpManager MSP=12.4-build124087
ManageEngine OpManager MSP=12.4-build124089
ManageEngine OpManager MSP=12.4-build124095
ManageEngine OpManager MSP=12.4-build124096
ManageEngine OpManager MSP=12.4-build124097
ManageEngine OpManager MSP=12.4-build124098
ManageEngine OpManager MSP=12.4-build124099
ManageEngine OpManager MSP=12.4-build124100
ManageEngine OpManager MSP=12.4-build124101
ManageEngine OpManager MSP=12.4-build124102
ManageEngine OpManager MSP=12.4-build124168
ManageEngine OpManager MSP=12.4-build124169
ManageEngine OpManager MSP=12.4-build124175
ManageEngine OpManager MSP=12.4-build124176
ManageEngine OpManager MSP=12.4-build124178

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-11527 vulnerability in Zoho ManageEngine OpManager before 12.4.181?

    In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.

  • How severe is CVE-2020-11527 in Zoho ManageEngine OpManager before 12.4.181?

    The severity of CVE-2020-11527 in Zoho ManageEngine OpManager before 12.4.181 is high with a CVSS score of 7.5.

  • Can an unauthenticated remote attacker exploit CVE-2020-11527 in Zoho ManageEngine OpManager before 12.4.181?

    Yes, an unauthenticated remote attacker can exploit CVE-2020-11527 in Zoho ManageEngine OpManager before 12.4.181 by sending a specially crafted URI.

  • How can I fix CVE-2020-11527 vulnerability in Zoho ManageEngine OpManager before 12.4.181?

    To fix CVE-2020-11527 vulnerability in Zoho ManageEngine OpManager before 12.4.181, update to version 12.4.181 or apply the necessary patches provided by the vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203