First published: Fri Oct 02 2020(Updated: )
A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Desktop Central | =10.0.552.w | |
Zohocorp Manageengine Remote Access Plus | <10.1.2119.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15589 is a design issue discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1.
The severity of CVE-2020-15589 is high with a score of 8.1.
Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1 are affected by CVE-2020-15589.
An attacker-controlled server can exploit CVE-2020-15589 to force the client to perform unauthorized actions.
Yes, you can find more information about CVE-2020-15589 on the manageengine.com website.