First published: Mon Mar 23 2020(Updated: )
An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Assetexplorer | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Zoho ManageEngine AssetExplorer is CVE-2020-8838.
The severity of CVE-2020-8838 is medium with a CVSS score of 6.4.
CVE-2020-8838 allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines during an upgrade of the Windows agent in Zoho ManageEngine AssetExplorer.
Yes, there are references available for CVE-2020-8838. You can find them at the following links: [link1](http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html), [link2](http://seclists.org/fulldisclosure/2020/May/29), [link3](https://www.manageengine.com/products/asset-explorer/sp-readme.html).
The Common Weakness Enumeration (CWE) ID for CVE-2020-8838 is CWE-354.