Vulnerability Details : CVE-2020-8838
Potential exploit
An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.
Vulnerability category: Execute code
Products affected by CVE-2020-8838
- cpe:2.3:a:zohocorp:manageengine_assetexplorer:6.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8838
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8838
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:A/AC:M/Au:S/C:P/I:P/A:P |
4.4
|
6.4
|
NIST | |
6.4
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.5
|
5.9
|
NIST |
CWE ids for CVE-2020-8838
-
The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-8838
-
http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html
ManageEngine Asset Explorer Windows Agent Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.manageengine.com/products/asset-explorer/sp-readme.html
AssetExplorer ITAM Solution ServicePacks ReadmeRelease Notes;Vendor Advisory
-
http://seclists.org/fulldisclosure/2020/May/29
Full Disclosure: Asset Explorer Windows Agent - Remote Code ExecutionExploit;Mailing List;Third Party Advisory
Jump to