
3/11/2023

21/11/2024
CVE-2023-4769: Server-Side Request Forgery in ManageEngine Desktop Central
First published: Fri Nov 03 2023(Updated: )
A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|
ManageEngine Desktop Central | =9.1.0 | |
Remedy
The vulnerability has been fixed in the latest version of Desktop Central.
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the vulnerability ID for this SSRF vulnerability in ManageEngine Desktop Central?
The vulnerability ID for this SSRF vulnerability in ManageEngine Desktop Central is CVE-2023-4769.
What is the affected software and version for this vulnerability?
The affected software and version for this vulnerability is ManageEngine Desktop Central version 9.1.0.
What is the severity of CVE-2023-4769?
The severity of CVE-2023-4769 is high with a severity value of 8.8.
How can an attacker exploit this vulnerability?
An attacker can exploit this vulnerability to launch targeted attacks, such as a cross-port attack, service enumeration, and other attacks via HTTP requests.
Is there a fix available for CVE-2023-4769?
Please refer to the vendor's security advisory or official documentation for information on patching or mitigating CVE-2023-4769.
- agent/type
- agent/first-publish-date
- agent/severity
- agent/references
- agent/weakness
- agent/title
- agent/remedy
- agent/author
- agent/description
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/softwarecombine
- agent/event
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/zohocorp
- canonical/manageengine desktop central
- version/manageengine desktop central/9.1.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203