First published: Tue Dec 20 2022(Updated: )
** DISPUTED ** An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. NOTE: the vendor's position is "it's not a vulnerability in our product."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Device Control Plus | =10.1.2228.15 | |
=10.1.2228.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47578 is an issue discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15 that allows bypassing USB restrictions.
The severity of CVE-2022-47578 is high with a CVSS score of 7.8.
CVE-2022-47578 affects Zoho ManageEngine Device Control Plus 10.1.2228.15 by allowing USB restrictions to be bypassed.
To fix CVE-2022-47578, it is recommended to update Zoho ManageEngine Device Control Plus to the latest version.
You can find more information about CVE-2022-47578 in the references provided: https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a and https://www.manageengine.com/device-control/how-to/device-control.html