Zoho ManageEngine CloudSecurityPlus up to 4116 updatePersonalizeSettings Privilege Escalation

A vulnerability was found in Zoho ManageEngine CloudSecurityPlus up to 4116 (Cloud Software). It has been rated as critical. Affected by this issue is some unknown processing of the component updatePersonalizeSettings. Upgrading to version 4117 eliminates this vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

021
118

Field

source_cve_nvd_summary1
exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1

Commit Conf

90%26
50%12
70%1

Approve Conf

90%26
80%12
70%1
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1205015101/15/2022VulD...cve_nvd_summaryZoho ManageEngine CloudSecurityPlus before Build 4117 allows remote code execution through the updatePersonalizeSettings component due to an improper security patch for CVE-2021-40175.cve.mitre.org01/15/2022accepted
70
1203710901/12/2022VulD...price_0day$0-$5ksee exploit price documentation01/12/2022accepted
90
1203710801/12/2022VulD...cvss3_meta_tempscore6.0see CVSS documentation01/12/2022accepted
90
1203710701/12/2022VulD...cvss3_meta_basescore6.3see CVSS documentation01/12/2022accepted
90
1203710601/12/2022VulD...cvss3_vuldb_tempscore6.0see CVSS documentation01/12/2022accepted
90
1203710501/12/2022VulD...cvss3_vuldb_basescore6.3see CVSS documentation01/12/2022accepted
90
1203710401/12/2022VulD...cvss2_vuldb_tempscore5.7see CVSS documentation01/12/2022accepted
90
1203710301/12/2022VulD...cvss2_vuldb_basescore6.5see CVSS documentation01/12/2022accepted
90
1203710201/12/2022VulD...cvss3_vuldb_eXderived from historical data01/12/2022accepted
80
1203710101/12/2022VulD...cvss3_vuldb_uiNderived from historical data01/12/2022accepted
80
1203710001/12/2022VulD...cvss3_vuldb_prLderived from historical data01/12/2022accepted
80
1203709901/12/2022VulD...cvss2_vuldb_eNDderived from historical data01/12/2022accepted
80
1203709801/12/2022VulD...cvss2_vuldb_auSderived from historical data01/12/2022accepted
80
1203709701/12/2022VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector01/12/2022accepted
80
1203709601/12/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector01/12/2022accepted
80
1203709501/12/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector01/12/2022accepted
80
1203709401/12/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector01/12/2022accepted
80
1203709301/12/2022VulD...cvss2_vuldb_ciPderived from vuldb v3 vector01/12/2022accepted
80
1203709201/12/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector01/12/2022accepted
80
1203709101/12/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector01/12/2022accepted
80

19 more entries are not shown

Do you know our Splunk app?

Download it now for free!