CVE-2020-10189
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
Analysis
Zoho ManageEngine Desktop Central before 10.0.474 allows unauthenticated remote code execution through Java deserialization in the FileStorage class, exploited by Chinese APT groups for enterprise network compromise.
Technical Context
The CWE-502 deserialization flaw in the getChartImage method of the FileStorage class processes untrusted serialized Java objects. Attackers send crafted requests to /cewolf/ or /mdm/ endpoints containing malicious serialized payloads using Commons Collections gadget chains.
Affected Products
['Zoho ManageEngine Desktop Central before 10.0.474']
Remediation
Update Desktop Central immediately. Audit all managed endpoints for unauthorized software deployed through Desktop Central. Restrict Desktop Central's network access to management networks only.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today