First published: Mon Dec 20 2021(Updated: )
Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine PAM360 | =4.0 | |
ManageEngine PAM360 | =4.0-build4001 | |
ManageEngine PAM360 | =4.0-build4002 | |
ManageEngine PAM360 | =4.1 | |
ManageEngine PAM360 | =4.1-build4100 | |
ManageEngine PAM360 | =4.1-build4101 | |
ManageEngine PAM360 | =4.5 | |
ManageEngine PAM360 | =4.5-build4500 | |
ManageEngine PAM360 | =4.5-build4501 | |
ManageEngine PAM360 | =5.0 | |
ManageEngine PAM360 | =5.0-build5000 | |
ManageEngine PAM360 | =5.0-build5001 | |
ManageEngine PAM360 | =5.0-build5002 | |
ManageEngine PAM360 | =5.0-build5003 | |
ManageEngine PAM360 | =5.0-build5004 | |
ManageEngine PAM360 | =5.1 | |
ManageEngine PAM360 | =5.1-build5100 | |
ManageEngine PAM360 | =5.2 | |
ManageEngine PAM360 | =5.2-build5200 | |
ManageEngine PAM360 | =5.3 | |
ManageEngine PAM360 | =5.3-build5300 | |
ManageEngine PAM360 | =5.3-build5301 | |
ManageEngine PAM360 | =5.3-build5302 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44525 is critical with a score of 9.8.
Attackers can exploit CVE-2021-44525 by bypassing the authentication filter and modifying certain aspects of the application state.
Zoho ManageEngine PAM360 versions 4.0 to 5.3 are affected by CVE-2021-44525.
No, authentication is not required to exploit CVE-2021-44525 in Zoho ManageEngine PAM360.
To fix CVE-2021-44525 in Zoho ManageEngine PAM360, update to build 5303 or a later version.