First published: Fri Dec 10 2021(Updated: )
Zoho Desktop Central contains an authentication bypass vulnerability that could allow an attacker to execute arbitrary code in the Desktop Central MSP server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Desktop Central | <10.1.2127.18 | |
Zohocorp Manageengine Desktop Central | <10.1.2127.18 | |
Zohocorp Manageengine Desktop Central | >=10.1.2128.0<=10.1.2137.3 | |
Zohocorp Manageengine Desktop Central | >=10.1.2128.0<10.1.2137.3 | |
Zoho Desktop Central | ||
<10.1.2127.18 | ||
<10.1.2127.18 | ||
>=10.1.2128.0<=10.1.2137.3 | ||
>=10.1.2128.0<10.1.2137.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44515 is an authentication bypass vulnerability in Zoho Desktop Central.
CVE-2021-44515 has a severity rating of 9.8, which is critical.
Zoho Desktop Central versions 10.1.2127.17 and earlier, as well as versions 10.1.2128.0 through 10.1.2137.2, are affected.
To fix CVE-2021-44515, users should upgrade their Zoho Desktop Central installations to version 10.1.2127.18 or later.
You can find more information about CVE-2021-44515 at the following references: [link1](https://pitstop.manageengine.com/portal/en/community/topic/an-authentication-bypass-vulnerability-identified-and-fixed-in-desktop-central-and-desktop-central-msp), [link2](https://www.cisa.gov/uscert/ncas/current-activity/2021/12/10/cisa-adds-thirteen-known-exploited-vulnerabilities-catalog), [link3](https://www.manageengine.com/products/desktop-central/cve-2021-44515-authentication-bypass-filter-configuration.html).