ManageEngine Desktop Central Remote Security Bypass

Critical Nessus Plugin ID 82081


The remote web server contains a Java web application that is affected by a security bypass vulnerability.


The version of ManageEngine Desktop Central running on the remote host is affected by a remote security bypass vulnerability, due to a failure to restrict access to 'DCPluginServelet'. This allows an unauthenticated, remote attacker to create an account with full administrative privileges within DesktopCentral and then perform any tasks DesktopCentral administrative users could perform, including the execution of code and commands on systems managed by DesktopCentral.


Upgrade to ManageEngine Desktop Central 9 build 90109 or later.

See Also

Plugin Details

Severity: Critical

ID: 82081

File Name: manageengine_desktop_central_90109_user_add_safe.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 2015/03/25

Updated: 2018/11/28

Dependencies: 71216

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_desktop_central

Required KB Items: installed_sw/ManageEngine Desktop Central

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/01/05

Vulnerability Publication Date: 2014/12/31

Reference Information

CVE: CVE-2014-7862

BID: 71849