Vulnerability Details CVE-2020-15589
A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.044
EPSS Ranking 88.3%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 6.8
Products affected by CVE-2020-15589
-
cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.552.w
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:-
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.252
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.253
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.254
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.255
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.256
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.257
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.258
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.259
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.415
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.416
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.421
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.422
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.428
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.430
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.431
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.432
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.433
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.434
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.435
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.436
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.440
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.447
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.448
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.450
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.451
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.452
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.453
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.454
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.465
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.466
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.468
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.469
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.472
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.473
-
cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.476