This vulnerability allows remote attackers to escalate privileges on affected installations of ManageEngine ServiceDesk Plus MSP. Authentication is required to exploit this vulnerability. The specific flaw exists within the exportMickeyList action. The issue results from the lack of proper validation of user-supplied data. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Zoho ManageEngine ServiceDesk Plus MSP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-18608 is rated as high due to its potential to escalate privileges for authenticated users.
To fix ZDI-CAN-18608, update your ManageEngine ServiceDesk Plus MSP to the latest patched version provided by the vendor.
ZDI-CAN-18608 affects installations of ManageEngine ServiceDesk Plus MSP that have not applied the necessary security updates.
ZDI-CAN-18608 is a privilege escalation vulnerability that requires authentication to exploit.
Yes, authentication is required to exploit the ZDI-CAN-18608 vulnerability on affected systems.