vulnerability
Zoho ManageEngine ADSelfService Plus: Unauthenticated Remote Code Execution Vulnerability (CVE-2022-47966)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Oct 28, 2022 | Jan 19, 2023 | May 14, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 28, 2022
Added
Jan 19, 2023
Modified
May 14, 2025
Description
Multiple ManageEngine products were affected by the unauthenticated remote code execution vulnerability due to the usage of an outdated third party dependency Apache Santuario.
Solution
zoho-manageengine-adselfservice-plus-upgrade-latest
References
- CVE-2022-47966
- https://attackerkb.com/topics/CVE-2022-47966
- URL-http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html
- URL-http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html
- URL-http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html
- URL-https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis
- URL-https://blog.viettelcybersecurity.com/saml-show-stopper/
- URL-https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6
- URL-https://github.com/horizon3ai/CVE-2022-47966
- URL-https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a
- URL-https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/
- URL-https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.