Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11669: CWE-862 Missing Authorization in Zohocorp ManageEngine PAM360

0
High
VulnerabilityCVE-2025-11669cvecve-2025-11669cwe-862
Published: Tue Jan 13 2026 (01/13/2026, 14:10:55 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: ManageEngine PAM360

Description

CVE-2025-11669 is a high-severity authorization vulnerability affecting Zohocorp's ManageEngine PAM360, Password Manager Pro, and Access Manager Plus products. The flaw exists in the initiate remote session functionality, allowing users with limited privileges to perform unauthorized actions. Exploitation requires network access and low privilege but no user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using these products for privileged access management are at risk of unauthorized access to sensitive credentials and sessions. Mitigation requires applying vendor patches once available and implementing strict access controls and monitoring. Countries with significant adoption of ManageEngine products and critical infrastructure sectors relying on privileged access management are most likely affected. The CVSS score of 8. 1 reflects the high impact and ease of exploitation under low privilege conditions.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:42:25 UTC

Technical Analysis

CVE-2025-11669 is a vulnerability classified under CWE-862 (Missing Authorization) found in Zohocorp's ManageEngine PAM360, Password Manager Pro, and Access Manager Plus products. The issue specifically affects versions prior to 8202 for PAM360, 13221 for Password Manager Pro, and 4401 for Access Manager Plus. The vulnerability resides in the 'initiate remote session' functionality, where the software fails to properly enforce authorization checks. This allows an attacker with low privileges (PR:L) and network access (AV:N) to initiate remote sessions without proper authorization, potentially gaining unauthorized access to sensitive systems or credentials managed by these products. The vulnerability does not require user interaction (UI:N) and affects confidentiality and integrity (C:H/I:H) but not availability (A:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. Although no exploits have been reported in the wild yet, the high CVSS score of 8.1 indicates a significant risk. ManageEngine products are widely used in enterprise environments for privileged access management, making this vulnerability critical for organizations relying on these tools to secure administrative credentials and sessions. The lack of patches at the time of reporting necessitates immediate attention to mitigate risk through compensating controls.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of privileged credentials and remote sessions managed by the affected ManageEngine products. Successful exploitation could allow attackers to bypass authorization controls, potentially leading to unauthorized access to critical systems, lateral movement within networks, and exposure of sensitive data. This could result in data breaches, compliance violations (e.g., GDPR), and operational disruptions in sectors such as finance, healthcare, government, and critical infrastructure. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the high CVSS score and the critical role of these products in enterprise security. Organizations relying heavily on ManageEngine PAM360 or related products should consider this vulnerability a high priority for remediation and risk management.

Mitigation Recommendations

1. Monitor Zohocorp's official channels closely for the release of security patches addressing CVE-2025-11669 and apply them immediately upon availability. 2. Until patches are available, restrict network access to the ManageEngine PAM360, Password Manager Pro, and Access Manager Plus management interfaces to trusted administrators only, using network segmentation and firewall rules. 3. Implement strict role-based access controls (RBAC) to minimize the number of users with privileges to initiate remote sessions. 4. Enable detailed logging and continuous monitoring of remote session initiation activities to detect any unauthorized attempts promptly. 5. Conduct regular audits of privileged accounts and session activities to identify anomalies. 6. Consider deploying additional multi-factor authentication (MFA) for accessing the management consoles to reduce the risk of credential misuse. 7. Educate administrators about the vulnerability and the importance of following security best practices until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zohocorp
Date Reserved
2025-10-13T04:36:27.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966562fa60475309f43a465

Added to database: 1/13/2026, 2:26:55 PM

Last enriched: 1/21/2026, 2:42:25 AM

Last updated: 2/7/2026, 12:04:24 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats