Learn about CVE-2022-29081 impacting Zoho ManageEngine Access Manager Plus, Password Manager Pro, and PAM360 due to an access-control bypass vulnerability on specific Rest API URLs.
Zoho ManageEngine Access Manager Plus, Password Manager Pro, and PAM360 are affected by an access-control bypass vulnerability on specific Rest API URLs. This vulnerability can be exploited via the ../RestAPI substring.
Understanding CVE-2022-29081
This CVE impacts Zoho ManageEngine's Access Manager Plus, Password Manager Pro, and PAM360 due to a vulnerability that allows access-control bypass on certain Rest API URLs.
What is CVE-2022-29081?
The vulnerability in Zoho ManageEngine products allows attackers to bypass access controls on particular Rest API URLs, potentially leading to unauthorized access.
The Impact of CVE-2022-29081
The impact of this vulnerability is significant as it could be exploited by malicious actors to gain unauthorized access to sensitive information or perform malicious actions on the affected systems.
Technical Details of CVE-2022-29081
The technical details of this CVE include:
Vulnerability Description
Zoho ManageEngine Access Manager Plus, Password Manager Pro, and PAM360 are vulnerable to an access-control bypass on specific Rest API URLs.
Affected Systems and Versions
The affected versions include Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401.
Exploitation Mechanism
The vulnerability can be exploited via the ../RestAPI substring, allowing attackers to bypass access controls on the identified Rest API URLs.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-29081, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates