Saturday, November 16, 2024
HomeCVE/vulnerabilityManageEngine Information Disclosure Flaw Exposes Encryption Keys

ManageEngine Information Disclosure Flaw Exposes Encryption Keys

Published on

ManageEngine, one of the most widely used IT infrastructure management platforms that offers more than 60 Enterprise IT management tools, has been discovered with an Information Disclosure vulnerability which is tracked as CVE-2023-6105.

This vulnerability affects multiple ManageEngine products, including ADManager, ADSelfService, M365 Manager, Endpoint Central, Service Desk, Access Manager, and many others. The severity of this vulnerability has been given as 5.5 (Medium).

CVE-2023-6105: ManageEngine Information Disclosure

This information disclosure vulnerability exposes encryption keys and exists on multiple ManageEngine products.

- Advertisement - SIEM as a Service

A low-privileged OS user with access to the host on an affected product can view and utilize the exposed key for decrypting the product database passwords, resulting in access to the ManageEngine product database.

Additionally, the encryption key is stored in the “CryptTag” configuration in <PRODUCT_INSTALLATION_DIR>\conf\customer-config.xml, and the usernames and passwords for ManageEngine product database can be found in the <PRODUCT_INSTALLATION_DIR>\conf\database_params.conf.

However, the database password can be decrypted using the encryption key from the XML file and the .conf file. An attacker with access to the product database can run OS commands with SYSTEM privileges or some administrative account privileges. 

Added to this, the threat actor can reset the password of an administrative user and view data contents that possess sensitive information. A has been published, which provides detailed information about the Python script used for decrypting the password and its output.

A complete report and proof of concept for this vulnerability has been published by Tenable, which provides detailed information about this vulnerability and its patches.

Affected Products

  • Service Desk Plus prior to version 14304
  • Asset Explorer prior to version 7004
  • Service Desk Plus MSP prior to version 14305
  • Support Center Plus prior to version 14304
  • Access Manager Plus prior to version 4310
  • PAM 360 prior to version 5700
  • Password Manager Pro prior to version 12300
  • OpManager prior to version 125632 on Windows and version 127243 on Linux
  • Firewall Analyser prior to version 125632 on Windows and version 127243 on Linux
  • Netflow Analyser prior to version 125632 on Windows and version 127243 on Linux
  • Network Configurations Manager prior to version 125632 on Windows and version 127243 on Linux
  • OpUtils prior to version 125632 on Windows and version 127243 on Linux
  • Creator On-Premise prior to version 2.0.0
  • Analytics Plus On-Premise prior to version 5300
  • ADSelfService Plus prior to version 6304
  • ADManager Plus prior to version 7210
  • ADAudit Plus prior to version 7251
  • Cloud Security Plus prior to version 4170
  • Data Security Plus prior to version 6126
  • Exchange Reporter Plus prior to version 5713
  • M365 Manager Plus prior to version 4539
  • M365 Security Plus prior to version 4539
  • SharePoint Manager Plus prior to version 4405
  • Recovery Manager Plus prior to version 6074
  • Log360 UEBA prior to version 4050
  • Endpoint Central prior to version 11.2.2322.01
  • Endpoint Central MSP prior to version 11.2.2322.01
  • Remote Monitoring and Management prior to version 10.2.11
  • Mobile Device Management prior to version 10.1.2204.2
  • Remote Access Plus prior to version 11.2.2328.01
  • OS Deployer prior to version 1.2.2331.1
  • Browser Security Plus prior to version 11.2.2328.01
  • Patch Manager Plus prior to version 11.2.2328.01
  • Vulnerability Manager Plus prior to version 11.2.2328.01
  • Application Control Plus prior to version 11.2.2328.01
  • Patch Connect Plus prior to version 90124
  • Device Control Plus prior to version 11.2.2328.01
  • Endpoint DLP Solution prior to version 11.2.2328.01
  • Secure Gateway Server prior to version 90091

Users of these ManageEngine products are recommended to apply vendor-specific patches for affected installations to prevent this vulnerability from getting exploited.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...