Skip to main content

CVE-2022-40772: n/a in n/a

Medium
VulnerabilityCVE-2022-40772cvecve-2022-40772
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to a validation bypass that allows users to access sensitive data via the report module.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:34:52 UTC

Technical Analysis

CVE-2022-40772 is a medium-severity vulnerability affecting Zoho ManageEngine ServiceDesk Plus versions 13010 and prior. The vulnerability arises from a validation bypass within the report module, which allows authenticated users with limited privileges (PR:L) to access sensitive data that should otherwise be restricted. The flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability (I:N/A:N). Essentially, an attacker with valid credentials but limited permissions can bypass validation controls in the reporting functionality to extract sensitive information, potentially including internal service desk data, user details, or other confidential organizational information managed within the ServiceDesk Plus platform. The vulnerability does not have known exploits in the wild as of the publication date (November 23, 2022), but the ease of exploitation combined with the sensitive nature of the data involved makes it a significant concern for organizations using this product. The lack of a patch link in the provided data suggests that remediation may require vendor engagement or upgrading to a fixed version beyond 13010. Given that ServiceDesk Plus is widely used for IT service management, this vulnerability could expose critical internal operational data if exploited.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. ServiceDesk Plus is commonly deployed in enterprises and public sector organizations to manage IT service requests, incidents, and asset management. Unauthorized access to sensitive data via the report module could lead to exposure of confidential internal communications, user credentials, or incident details, which could be leveraged for further attacks such as social engineering or lateral movement within networks. This risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and government agencies, where data leakage could result in regulatory penalties under GDPR and damage to organizational reputation. Additionally, the vulnerability could undermine trust in IT service management processes and complicate incident response efforts. Since the vulnerability requires authenticated access, insider threats or compromised user accounts pose a particular risk. The medium severity rating indicates that while the vulnerability does not allow full system compromise, the confidentiality breach potential is significant enough to warrant prompt attention.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately verify the version of ManageEngine ServiceDesk Plus in use and plan an upgrade to a version beyond 13010 where the vulnerability is addressed. 2) Restrict access to the ServiceDesk Plus application to only trusted users and networks, employing network segmentation and VPNs where appropriate. 3) Implement strict access controls and regularly audit user privileges to minimize the number of users with report module access. 4) Monitor logs for unusual access patterns to the report module, especially from accounts with limited privileges. 5) Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 6) Engage with Zoho support or consult official advisories to obtain patches or workarounds if immediate upgrading is not feasible. 7) Educate IT staff about the risks of this vulnerability and the importance of timely patching and access management. 8) Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious report module access attempts until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef424

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:34:52 PM

Last updated: 7/26/2025, 7:55:09 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats