Monday, March 17, 2025
HomeCVE/vulnerabilityManageEngine Analytics Vulnerability Enables User Account Takeover

ManageEngine Analytics Vulnerability Enables User Account Takeover

Published on

SIEM as a Service

Follow Us on Google News

A significant security vulnerability has been identified in ManageEngine’s Analytics Plus on-premise solution, affecting all Windows builds below version 6130.

This high-severity vulnerability, designated as CVE-2025-1724, allows unauthorized access to authenticated AD user accounts, potentially leading to account takeovers and exposure of sensitive user information.

CVE-2025-1724: AD Authentication User Account Takeover Vulnerability

This critical issue impacts organizations that use Analytics Plus on-premise with Windows-based Active Directory (AD) authentication, provided that Active Directory Single Sign-On (SSO) is not configured.

The vulnerability allows attackers to exploit weaknesses in the system’s authentication mechanism.

Affected Products:

Product NameAffected Software Version(s)Fixed VersionFixed On
Analytics Plus on-premiseAll Analytics Plus on-premise Windows builds below 6130Build 6130March 11, 2025

The vulnerability poses a significant risk as it could result in unauthorized access to user accounts, leading to potential data breaches and other malicious activities.

This could severely compromise the confidentiality, integrity, and availability of user data.

The vulnerability specifically affects Windows installations of Analytics Plus on-premise where users authenticate through Active Directory without using Active Directory SSO.

Organizations with this setup are at risk unless they apply the necessary updates.

ManageEngine has addressed this issue by enhancing security measures to generate installation-specific keys and storing them with robust encryption.

This modification ensures that user accounts are better protected against unauthorized access.

Steps to Upgrade:

To mitigate this vulnerability, users are advised to follow these steps:

  1. Download the Latest Upgrade Pack: Visit the service pack page to download the latest upgrade pack for Analytics Plus on-premise.
  2. Follow Upgrade Instructions: Refer to the detailed instructions provided on the service pack page to successfully upgrade to build 6130 or later.

Recommendations:

  • Prompt Action: Organizations using affected versions of Analytics Plus on-premise should take immediate action to upgrade to the fixed version.
  • Security Audits: Regularly conduct security audits to identify and patch vulnerabilities before they become exploited.
  • User Awareness: Educate users about the importance of keeping software up-to-date to avoid potential security risks.

The recent discovery and fixing of CVE-2025-1724 highlights the importance of maintaining updated software and robust security practices to protect against user account takeovers and data breaches.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...