ID

VAR-202208-0863


CVE

CVE-2022-36923


TITLE

Zoho Corporation  of  ManageEngine Firewall Analyzer  and  ManageEngine NetFlow Analyzer  Vulnerability in handling exceptional conditions in

Trust: 0.8

sources: JVNDB: JVNDB-2022-014729

DESCRIPTION

Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs. Zoho Corporation of ManageEngine Firewall Analyzer and ManageEngine NetFlow Analyzer Exists in a vulnerability in handling exceptional conditions.Information may be obtained. This vulnerability allows remote attackers to bypass authentication on affected installations of ManageEngine Network Configuration Manager. Authentication is not required to exploit this vulnerability.The specific flaw exists within the getUserAPIKey function. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. ZOHO ManageEngine OpManager etc. are all products of ZOHO India. ZOHO ManageEngine OpManager is a comprehensive network monitoring software. ZOHO ManageEngine OpManager Plus is an IT operations management solution for Windows and Linux systems. ZOHO ManageEngine OpManager MSP is an easy-to-use network and server management software

Trust: 4.32

sources: NVD: CVE-2022-36923 // JVNDB: JVNDB-2022-014729 // ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // VULHUB: VHN-427594 // VULMON: CVE-2022-36923

AFFECTED PRODUCTS

vendor:manageenginemodel:opmanagerscope: - version: -

Trust: 1.4

vendor:zohocorpmodel:manageengine opmanager mspscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine network configuration managerscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine opmanager mspscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine oputilsscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine netflow analyzerscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine firewall analyzerscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine opmanager plusscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine netflow analyzerscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine opmanager plusscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine opmanagerscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine firewall analyzerscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine opmanagerscope:eqversion:12.6

Trust: 1.0

vendor:zohocorpmodel:manageengine network configuration managerscope:eqversion:12.5

Trust: 1.0

vendor:zohocorpmodel:manageengine oputilsscope:eqversion:12.5

Trust: 1.0

vendor:zohomodel:manageengine netflow analyzerscope: - version: -

Trust: 0.8

vendor:zohomodel:manageengine firewall analyzerscope: - version: -

Trust: 0.8

vendor:manageenginemodel:netflow analyzerscope: - version: -

Trust: 0.7

vendor:manageenginemodel:network configuration managerscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // JVNDB: JVNDB-2022-014729 // NVD: CVE-2022-36923

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2022-36923
value: CRITICAL

Trust: 2.8

nvd@nist.gov: CVE-2022-36923
value: HIGH

Trust: 1.0

NVD: CVE-2022-36923
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202208-2747
value: HIGH

Trust: 0.6

ZDI: CVE-2022-36923
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 5.5
version: 3.0

Trust: 2.1

nvd@nist.gov: CVE-2022-36923
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-36923
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-36923
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // JVNDB: JVNDB-2022-014729 // CNNVD: CNNVD-202208-2747 // NVD: CVE-2022-36923

PROBLEMTYPE DATA

problemtype:CWE-755

Trust: 1.1

problemtype:Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-427594 // JVNDB: JVNDB-2022-014729 // NVD: CVE-2022-36923

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202208-2747

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202208-2747

PATCH

title:ManageEngine has issued an update to correct this vulnerability.url:https://www.manageengine.com/itom/advisory/cve-2022-36923.html

Trust: 2.8

title:Multiple ZOHO ManageEngine Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204578

Trust: 0.6

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // CNNVD: CNNVD-202208-2747

EXTERNAL IDS

db:NVDid:CVE-2022-36923

Trust: 6.2

db:JVNDBid:JVNDB-2022-014729

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-18088

Trust: 0.7

db:ZDIid:ZDI-22-1122

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-18089

Trust: 0.7

db:ZDIid:ZDI-22-1121

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-18087

Trust: 0.7

db:ZDIid:ZDI-22-1120

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-17698

Trust: 0.7

db:ZDIid:ZDI-22-1119

Trust: 0.7

db:CNNVDid:CNNVD-202208-2747

Trust: 0.7

db:VULHUBid:VHN-427594

Trust: 0.1

db:VULMONid:CVE-2022-36923

Trust: 0.1

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // VULHUB: VHN-427594 // VULMON: CVE-2022-36923 // JVNDB: JVNDB-2022-014729 // CNNVD: CNNVD-202208-2747 // NVD: CVE-2022-36923

REFERENCES

url:https://www.manageengine.com/itom/advisory/cve-2022-36923.html

Trust: 5.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-36923

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-36923/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119 // VULHUB: VHN-427594 // VULMON: CVE-2022-36923 // JVNDB: JVNDB-2022-014729 // CNNVD: CNNVD-202208-2747 // NVD: CVE-2022-36923

CREDITS

Anonymous

Trust: 2.8

sources: ZDI: ZDI-22-1122 // ZDI: ZDI-22-1121 // ZDI: ZDI-22-1120 // ZDI: ZDI-22-1119

SOURCES

db:ZDIid:ZDI-22-1122
db:ZDIid:ZDI-22-1121
db:ZDIid:ZDI-22-1120
db:ZDIid:ZDI-22-1119
db:VULHUBid:VHN-427594
db:VULMONid:CVE-2022-36923
db:JVNDBid:JVNDB-2022-014729
db:CNNVDid:CNNVD-202208-2747
db:NVDid:CVE-2022-36923

LAST UPDATE DATE

2024-08-14T14:37:21.646000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1122date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1121date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1120date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1119date:2022-08-18T00:00:00
db:VULHUBid:VHN-427594date:2022-08-16T00:00:00
db:VULMONid:CVE-2022-36923date:2022-08-10T00:00:00
db:JVNDBid:JVNDB-2022-014729date:2023-09-21T08:08:00
db:CNNVDid:CNNVD-202208-2747date:2022-08-17T00:00:00
db:NVDid:CVE-2022-36923date:2022-08-16T16:01:19.867

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1122date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1121date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1120date:2022-08-18T00:00:00
db:ZDIid:ZDI-22-1119date:2022-08-18T00:00:00
db:VULHUBid:VHN-427594date:2022-08-10T00:00:00
db:VULMONid:CVE-2022-36923date:2022-08-10T00:00:00
db:JVNDBid:JVNDB-2022-014729date:2023-09-21T00:00:00
db:CNNVDid:CNNVD-202208-2747date:2022-08-10T00:00:00
db:NVDid:CVE-2022-36923date:2022-08-10T20:16:03.343