6.8
CVSSv3

CVE-2019-12476

Published: 17/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An authentication bypass vulnerability in the password reset functionality in Zoho ManageEngine ADSelfService Plus prior to 5.0.6 allows an attacker with physical access to gain a shell with SYSTEM privileges via the restricted thick client browser. The attack uses a long sequence of crafted keyboard input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zohocorp manageengine_adselfservice_plus

Github Repositories

ADSelfService-Plus-PoC CVE-2019-12476 ADSelfService Plus version 433 PoC for an authentication bypass on Windows 10 Affects all versions of Windows PoC Video Steps to repoduce Disconnect from your enterprise network Connect to your own hotspot Click on reset password; the thick client browser should error out with a 404 if the password reset web application is hosted in t