Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-40772: n/a in n/a

0
Medium
VulnerabilityCVE-2022-40772cvecve-2022-40772
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to a validation bypass that allows users to access sensitive data via the report module.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:34:52 UTC

Technical Analysis

CVE-2022-40772 is a medium-severity vulnerability affecting Zoho ManageEngine ServiceDesk Plus versions 13010 and prior. The vulnerability arises from a validation bypass within the report module, which allows authenticated users with limited privileges (PR:L) to access sensitive data that should otherwise be restricted. The flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability (I:N/A:N). Essentially, an attacker with valid credentials but limited permissions can bypass validation controls in the reporting functionality to extract sensitive information, potentially including internal service desk data, user details, or other confidential organizational information managed within the ServiceDesk Plus platform. The vulnerability does not have known exploits in the wild as of the publication date (November 23, 2022), but the ease of exploitation combined with the sensitive nature of the data involved makes it a significant concern for organizations using this product. The lack of a patch link in the provided data suggests that remediation may require vendor engagement or upgrading to a fixed version beyond 13010. Given that ServiceDesk Plus is widely used for IT service management, this vulnerability could expose critical internal operational data if exploited.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. ServiceDesk Plus is commonly deployed in enterprises and public sector organizations to manage IT service requests, incidents, and asset management. Unauthorized access to sensitive data via the report module could lead to exposure of confidential internal communications, user credentials, or incident details, which could be leveraged for further attacks such as social engineering or lateral movement within networks. This risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and government agencies, where data leakage could result in regulatory penalties under GDPR and damage to organizational reputation. Additionally, the vulnerability could undermine trust in IT service management processes and complicate incident response efforts. Since the vulnerability requires authenticated access, insider threats or compromised user accounts pose a particular risk. The medium severity rating indicates that while the vulnerability does not allow full system compromise, the confidentiality breach potential is significant enough to warrant prompt attention.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately verify the version of ManageEngine ServiceDesk Plus in use and plan an upgrade to a version beyond 13010 where the vulnerability is addressed. 2) Restrict access to the ServiceDesk Plus application to only trusted users and networks, employing network segmentation and VPNs where appropriate. 3) Implement strict access controls and regularly audit user privileges to minimize the number of users with report module access. 4) Monitor logs for unusual access patterns to the report module, especially from accounts with limited privileges. 5) Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 6) Engage with Zoho support or consult official advisories to obtain patches or workarounds if immediate upgrading is not feasible. 7) Educate IT staff about the risks of this vulnerability and the importance of timely patching and access management. 8) Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious report module access attempts until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef424

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:34:52 PM

Last updated: 2/7/2026, 5:11:55 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats