fkie_cve-2024-41140
Vulnerability from fkie_nvd
Published
2025-01-29 12:15
Modified
2025-09-29 18:08
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
Zohocorp ManageEngine Applications Manager versions 174000 and prior are vulnerable to the incorrect authorization in the update user function.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F60B2FA-65D9-4F15-8F36-5BBD328D70E9", "versionEndExcluding": "17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B24E6C3-B81B-4324-A3AF-02B8C5A9CACD", "versionEndExcluding": "17.3", "versionStartIncluding": "17.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:-:*:*:*:*:*:*", "matchCriteriaId": "6DBF4AD2-F1FA-4397-872D-15F7F0B499ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170000:*:*:*:*:*:*", "matchCriteriaId": "24D9A360-987B-4631-AC4E-A83C19AC6218", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170001:*:*:*:*:*:*", "matchCriteriaId": "CF0F0C0E-7534-490B-B009-8B24E258D8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170002:*:*:*:*:*:*", "matchCriteriaId": "FD6375B4-C9BD-44F0-A0B9-2F5CD80EE54C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170003:*:*:*:*:*:*", "matchCriteriaId": "AD694576-88FB-4A79-9A7E-744359439133", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170004:*:*:*:*:*:*", "matchCriteriaId": "719105AD-C4D8-43FD-AF87-2E1F400413E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170005:*:*:*:*:*:*", "matchCriteriaId": "6AF01C0D-3362-46B0-8D9E-2D54AD6906D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170006:*:*:*:*:*:*", "matchCriteriaId": "2FB1C60A-13B5-4D35-834D-39D31F07A46E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.0:build170007:*:*:*:*:*:*", "matchCriteriaId": "A0A66F8C-322C-4AE8-A915-85D813028E8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:-:*:*:*:*:*:*", "matchCriteriaId": "3785344C-D42E-4408-8DA6-05800B17D61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173000:*:*:*:*:*:*", "matchCriteriaId": "87A0EB98-F81A-4870-8D78-4E6C0B7F06D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173100:*:*:*:*:*:*", "matchCriteriaId": "26D43D3E-99DA-4BAA-8326-FB0C344CD58F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173200:*:*:*:*:*:*", "matchCriteriaId": "444D1677-D36C-4402-A78B-E719B8EE7C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173300:*:*:*:*:*:*", "matchCriteriaId": "5AAC7171-AAFC-4308-9181-22B4C9E92196", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173301:*:*:*:*:*:*", "matchCriteriaId": "3CB9713C-4105-4E98-AC7A-9057B6657329", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:17.3:build173302:*:*:*:*:*:*", "matchCriteriaId": "09C7E0A0-FE94-4702-9099-3BD1636E99CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zohocorp ManageEngine Applications Manager versions\u00a0174000 and prior are vulnerable to the incorrect authorization in the update user function." }, { "lang": "es", "value": "Las versiones 174000 y anteriores de Zohocorp ManageEngine Applications Manager son vulnerables a la autorizaci\u00f3n incorrecta en la funci\u00f3n de actualizaci\u00f3n de usuario." } ], "id": "CVE-2024-41140", "lastModified": "2025-09-29T18:08:54.547", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-01-29T12:15:28.293", "references": [ { "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "tags": [ "Vendor Advisory" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2024-41140.html" } ], "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…