Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11669: CWE-862 Missing Authorization in Zohocorp ManageEngine PAM360

0
High
VulnerabilityCVE-2025-11669cvecve-2025-11669cwe-862
Published: Tue Jan 13 2026 (01/13/2026, 14:10:55 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: ManageEngine PAM360

Description

Zohocorp ManageEngine PAM360 versions before 8202; Password Manager Pro versions before 13221; Access Manager Plus versions prior to 4401 are vulnerable to an authorization issue in the initiate remote session functionality.

AI-Powered Analysis

AILast updated: 01/13/2026, 14:41:07 UTC

Technical Analysis

CVE-2025-11669 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Zohocorp's ManageEngine PAM360, Password Manager Pro, and Access Manager Plus products. The flaw resides in the initiate remote session functionality, where the software fails to properly enforce authorization checks. This allows an attacker with low-level privileges (PR:L) to initiate remote sessions without proper authorization, potentially gaining unauthorized access to sensitive privileged credentials or systems managed by these platforms. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N), increasing its risk profile. The CVSS v3.1 base score of 8.1 indicates high severity, with high impact on confidentiality and integrity but no impact on availability. Although no public exploits are currently known, the vulnerability’s nature and the critical role of these products in managing privileged access make it a significant threat. The lack of patches at the time of reporting necessitates immediate attention to access controls and monitoring. The vulnerability affects all versions prior to 8202 for PAM360, prior to 13221 for Password Manager Pro, and prior to 4401 for Access Manager Plus, indicating a broad impact across multiple widely used enterprise security products.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the security of privileged credentials and access management systems. Successful exploitation could lead to unauthorized remote sessions, enabling attackers to access sensitive systems, escalate privileges, and potentially move laterally within networks. This threatens the confidentiality and integrity of critical data and systems, especially in sectors such as finance, healthcare, government, and critical infrastructure where privileged access management is vital. The absence of known exploits reduces immediate risk but does not diminish the urgency due to the ease of exploitation and high impact. Organizations relying on these Zohocorp products may face regulatory and compliance risks under GDPR and other data protection laws if breaches occur. The vulnerability could also undermine trust in managed services and IT operations, leading to operational disruptions and reputational damage.

Mitigation Recommendations

1. Immediately inventory and identify all instances of ManageEngine PAM360, Password Manager Pro, and Access Manager Plus within the organization. 2. Apply vendor patches as soon as they become available; monitor Zohocorp advisories closely. 3. Until patches are applied, restrict network access to the management interfaces using network segmentation, firewalls, and VPNs to limit exposure. 4. Enforce strict role-based access controls (RBAC) and review user privileges to ensure minimal necessary permissions, especially for initiating remote sessions. 5. Enable and monitor detailed logging and alerting on remote session initiation activities to detect anomalous or unauthorized attempts. 6. Conduct penetration testing and vulnerability scanning focused on these products to identify potential exploitation paths. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving privileged access compromise. 8. Consider deploying additional endpoint detection and response (EDR) tools to detect lateral movement stemming from compromised privileged sessions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zohocorp
Date Reserved
2025-10-13T04:36:27.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966562fa60475309f43a465

Added to database: 1/13/2026, 2:26:55 PM

Last enriched: 1/13/2026, 2:41:07 PM

Last updated: 1/13/2026, 3:28:45 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats