Zoho ManageEngine OpManager up to 11.5 Build 11600 Authentication hard-coded credentials
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, has been found in Zoho ManageEngine OpManager up to 11.5 Build 11600. This vulnerability affects unknown code of the component Authentication. Performing a manipulation with the input plugin results in hard-coded credentials.
This vulnerability is known as CVE-2015-7765. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
Details
A vulnerability classified as critical has been found in Zoho ManageEngine OpManager up to 11.5 Build 11600 (Network Management Software). This affects an unknown functionality of the component Authentication. The manipulation with the input value plugin leads to a hard-coded credentials vulnerability. CWE is classifying the issue as CWE-798. The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
The weakness was published 10/09/2015 (Website). The advisory is shared at exploit-db.com. This vulnerability is uniquely identified as CVE-2015-7765 since 10/09/2015. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known. MITRE ATT&CK project uses the attack technique T1110.001 for this issue.
A public exploit has been developed by Metasploit and been published even before and not after the advisory. The exploit is shared for download at exploit-db.com. It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 22 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 81380 (ManageEngine OpManager Default Credentials), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Exploit-DB (38221) and Tenable (81380). Similar entry is available at VDB-78346. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.manageengine.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.3
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Hard-coded credentialsCWE: CWE-798 / CWE-259 / CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Author: Metasploit
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 81380
Nessus Name: ManageEngine OpManager Default Credentials
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 803777
OpenVAS Name: ManageEngine OpManager Multiple Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: manage_engine_opmanager_rce.rb
MetaSploit Name: ManageEngine OpManager Remote Code Execution
MetaSploit File: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
09/17/2015 🔍09/17/2015 🔍
10/09/2015 🔍
10/09/2015 🔍
10/09/2015 🔍
10/12/2015 🔍
08/31/2024 🔍
Sources
Vendor: manageengine.comAdvisory: 133596
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-7765 (🔍)
GCVE (CVE): GCVE-0-2015-7765
GCVE (VulDB): GCVE-100-78345
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 10/12/2015 10:33Updated: 08/31/2024 06:54
Changes: 10/12/2015 10:33 (55), 09/21/2018 17:32 (15), 06/20/2022 14:57 (2), 06/20/2022 14:59 (1), 08/31/2024 06:54 (14)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.