CSRF Vulnerability - ZVE-2024-1132

Severity: Medium

ZVE ID: ZVE-2024-1132

Product name Affected Version(s) Fixed Version(s) Fixed On
OpManager
OpManager Plus
OpManager MSP
NetFlow Analyzer
Network Configuration Manager
Firewall Analyzer
OpUtils
From version 128151 to 128246 128247 & above 14-05-2024
Below version 128103 128103 to 128150 31-05-2024

Details:

General: Previously, external users were able to utilize the network tools without authentication to perform ping or SNMP ping on network devices. This has now been fixed.

Impact:

These tools can be used by an external user without authentication to ping or SNMP ping the devices on the network.

Steps to upgrade:

  1. Kindly download the latest upgrade pack from here.
  2. Apply the latest build to your existing product installation as per the upgrade pack instructions provided in the above step.

Source and Acknowledgements

This vulnerability was reported by Jayateertha Guruprasad.

Kindly contact our product support team for further details, at the below mentioned email address:

Video Zone
OpManager Customer Videos
Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
  
  •  Venkatesan Veerappan, IT Consultant
     Mohd Jaffer Tawfiq Murtaja, Information Security officer from Al Ain sports club
  •  Jonathan ManageEngine Customer
     IT Admin from "Royal flying doctor service", Australia
  •  Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
     Michael - Network & Tech, ManageEngine Customer
  •  Altaleb Alshenqiti - Ministry of National Guard - Health Affairs
     Donald Stewart, IT Manager from Crest Industries
  •  John Rosser, MIS Manager - Yale Chase Equipment & Services
     David Tremont, Associate Directory of Infrastructure,USA
Training and Support
Connect with us:
     

ManageEngine is a division of Zoho Corp.

+-
Do you want a Price Quote?
For how many devices?
Fill out the form below
Name *
Business Email *
Phone *
By clicking 'Send', you agree to processing of personal data according to the Privacy Policy.
Thank you!
Back to Top