← Back to CVEs
CVE-2018-5353
CRITICAL9.8
Description
The custom GINA/CP module in Zoho ManageEngine ADSelfService Plus before 5.5 build 5517 allows remote attackers to execute code and escalate privileges via spoofing. It does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP. Additionally, if the web server has a misconfigured certificate then no spoofing attack is required
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/30/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
zohocorp:manageengine_adselfservice_plus
Weaknesses (CWE)
CWE-290
References
http://zoho.com(cve@mitre.org)
https://github.com/missing0x00/CVE-2018-5353(cve@mitre.org)
http://zoho.com(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/missing0x00/CVE-2018-5353(af854a3a-2127-422b-91ae-364da2661108)
https://www.manageengine.com/products/self-service-password/release-notes.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.