CWE
502
Advisory Published
Updated

CVE-2021-3287

First published: Thu Apr 22 2021(Updated: )

Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
ManageEngine OpManager MSP<12.5
ManageEngine OpManager MSP=12.5
ManageEngine OpManager MSP=12.5-build125000
ManageEngine OpManager MSP=12.5-build125002
ManageEngine OpManager MSP=12.5-build125100
ManageEngine OpManager MSP=12.5-build125101
ManageEngine OpManager MSP=12.5-build125102
ManageEngine OpManager MSP=12.5-build125108
ManageEngine OpManager MSP=12.5-build125110
ManageEngine OpManager MSP=12.5-build125111
ManageEngine OpManager MSP=12.5-build125112
ManageEngine OpManager MSP=12.5-build125113
ManageEngine OpManager MSP=12.5-build125114
ManageEngine OpManager MSP=12.5-build125116
ManageEngine OpManager MSP=12.5-build125117
ManageEngine OpManager MSP=12.5-build125118
ManageEngine OpManager MSP=12.5-build125120
ManageEngine OpManager MSP=12.5-build125121
ManageEngine OpManager MSP=12.5-build125123
ManageEngine OpManager MSP=12.5-build125124
ManageEngine OpManager MSP=12.5-build125125
ManageEngine OpManager MSP=12.5-build125136
ManageEngine OpManager MSP=12.5-build125137
ManageEngine OpManager MSP=12.5-build125139
ManageEngine OpManager MSP=12.5-build125140
ManageEngine OpManager MSP=12.5-build125143
ManageEngine OpManager MSP=12.5-build125144
ManageEngine OpManager MSP=12.5-build125145
ManageEngine OpManager MSP=12.5-build125156
ManageEngine OpManager MSP=12.5-build125157
ManageEngine OpManager MSP=12.5-build125158
ManageEngine OpManager MSP=12.5-build125159
ManageEngine OpManager MSP=12.5-build125161
ManageEngine OpManager MSP=12.5-build125163
ManageEngine OpManager MSP=12.5-build125174
ManageEngine OpManager MSP=12.5-build125175
ManageEngine OpManager MSP=12.5-build125176
ManageEngine OpManager MSP=12.5-build125177
ManageEngine OpManager MSP=12.5-build125178
ManageEngine OpManager MSP=12.5-build125180
ManageEngine OpManager MSP=12.5-build125181
ManageEngine OpManager MSP=12.5-build125192
ManageEngine OpManager MSP=12.5-build125193
ManageEngine OpManager MSP=12.5-build125194
ManageEngine OpManager MSP=12.5-build125195
ManageEngine OpManager MSP=12.5-build125196
ManageEngine OpManager MSP=12.5-build125197
ManageEngine OpManager MSP=12.5-build125198
ManageEngine OpManager MSP=12.5-build125201
ManageEngine OpManager MSP=12.5-build125204
ManageEngine OpManager MSP=12.5-build125212
ManageEngine OpManager MSP=12.5-build125213
ManageEngine OpManager MSP=12.5-build125214
ManageEngine OpManager MSP=12.5-build125215
ManageEngine OpManager MSP=12.5-build125216
ManageEngine OpManager MSP=12.5-build125228
ManageEngine OpManager MSP=12.5-build125229
ManageEngine OpManager MSP=12.5-build125230
ManageEngine OpManager MSP=12.5-build125231
ManageEngine OpManager MSP=12.5-build125232
ManageEngine OpManager MSP=12.5-build125233
ManageEngine OpManager MSP=12.5-build125312
ManageEngine OpManager MSP=12.5-build125323
ManageEngine OpManager MSP=12.5-build125324
ManageEngine OpManager MSP=12.5-build125326
ManageEngine OpManager MSP=12.5-build125328

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-3287?

    CVE-2021-3287 is classified as a critical vulnerability due to the potential for unauthenticated remote code execution.

  • How do I fix CVE-2021-3287?

    To fix CVE-2021-3287, you should update your Zoho ManageEngine OpManager to version 12.5.329 or later.

  • What impact does CVE-2021-3287 have on my system?

    CVE-2021-3287 allows attackers to execute arbitrary code on the affected system without authentication.

  • What versions of ManageEngine OpManager are affected by CVE-2021-3287?

    CVE-2021-3287 affects ManageEngine OpManager versions prior to 12.5.329.

  • Is there an exploit for CVE-2021-3287 available in the wild?

    Yes, there are reports that CVE-2021-3287 is being actively exploited, making it essential to patch immediately.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203