First published: Tue Jul 19 2022(Updated: )
Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus contain an unspecified vulnerability that allows for remote code execution.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zoho ManageEngine | ||
Zohocorp Manageengine Access Manager Plus | <4.3 | |
Zohocorp Manageengine Access Manager Plus | =4.3-build4300 | |
Zohocorp Manageengine Access Manager Plus | =4.3-build4301 | |
Zohocorp Manageengine Access Manager Plus | =4.3-build4302 | |
Zohocorp ManageEngine PAM360 | <5.5 | |
Zohocorp ManageEngine PAM360 | =5.5-build5500 | |
Zohocorp Manageengine Password Manager Pro | <12.1 | |
Zohocorp Manageengine Password Manager Pro | =12.1-build12100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35405 is a vulnerability in Zoho ManageEngine Password Manager Pro and PAM360 that allows unauthenticated remote code execution.
CVE-2022-35405 has a severity rating of 9.8 out of 10, which is considered critical.
CVE-2022-35405 affects Zoho ManageEngine Password Manager Pro, PAM360, and Access Manager Plus.
An attacker can exploit CVE-2022-35405 by sending a specially crafted request to the vulnerable Zoho ManageEngine products, allowing them to execute remote code without authentication.
You can find more information about CVE-2022-35405 at the following references: [Packet Storm Security](http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html), [ManageEngine Advisory](https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html).