CVE-2025-11669: CWE-862 Missing Authorization in Zohocorp ManageEngine PAM360
Zohocorp ManageEngine PAM360 versions before 8202; Password Manager Pro versions before 13221; Access Manager Plus versions prior to 4401 are vulnerable to an authorization issue in the initiate remote session functionality.
AI Analysis
Technical Summary
CVE-2025-11669 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Zohocorp's ManageEngine PAM360, Password Manager Pro, and Access Manager Plus products. The flaw resides in the initiate remote session functionality, where the software fails to properly enforce authorization checks. This allows an attacker with low-level privileges (PR:L) to initiate remote sessions without proper authorization, potentially gaining unauthorized access to sensitive privileged credentials or systems managed by these platforms. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N), increasing its risk profile. The CVSS v3.1 base score of 8.1 indicates high severity, with high impact on confidentiality and integrity but no impact on availability. Although no public exploits are currently known, the vulnerability’s nature and the critical role of these products in managing privileged access make it a significant threat. The lack of patches at the time of reporting necessitates immediate attention to access controls and monitoring. The vulnerability affects all versions prior to 8202 for PAM360, prior to 13221 for Password Manager Pro, and prior to 4401 for Access Manager Plus, indicating a broad impact across multiple widely used enterprise security products.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security of privileged credentials and access management systems. Successful exploitation could lead to unauthorized remote sessions, enabling attackers to access sensitive systems, escalate privileges, and potentially move laterally within networks. This threatens the confidentiality and integrity of critical data and systems, especially in sectors such as finance, healthcare, government, and critical infrastructure where privileged access management is vital. The absence of known exploits reduces immediate risk but does not diminish the urgency due to the ease of exploitation and high impact. Organizations relying on these Zohocorp products may face regulatory and compliance risks under GDPR and other data protection laws if breaches occur. The vulnerability could also undermine trust in managed services and IT operations, leading to operational disruptions and reputational damage.
Mitigation Recommendations
1. Immediately inventory and identify all instances of ManageEngine PAM360, Password Manager Pro, and Access Manager Plus within the organization. 2. Apply vendor patches as soon as they become available; monitor Zohocorp advisories closely. 3. Until patches are applied, restrict network access to the management interfaces using network segmentation, firewalls, and VPNs to limit exposure. 4. Enforce strict role-based access controls (RBAC) and review user privileges to ensure minimal necessary permissions, especially for initiating remote sessions. 5. Enable and monitor detailed logging and alerting on remote session initiation activities to detect anomalous or unauthorized attempts. 6. Conduct penetration testing and vulnerability scanning focused on these products to identify potential exploitation paths. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving privileged access compromise. 8. Consider deploying additional endpoint detection and response (EDR) tools to detect lateral movement stemming from compromised privileged sessions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-11669: CWE-862 Missing Authorization in Zohocorp ManageEngine PAM360
Description
Zohocorp ManageEngine PAM360 versions before 8202; Password Manager Pro versions before 13221; Access Manager Plus versions prior to 4401 are vulnerable to an authorization issue in the initiate remote session functionality.
AI-Powered Analysis
Technical Analysis
CVE-2025-11669 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Zohocorp's ManageEngine PAM360, Password Manager Pro, and Access Manager Plus products. The flaw resides in the initiate remote session functionality, where the software fails to properly enforce authorization checks. This allows an attacker with low-level privileges (PR:L) to initiate remote sessions without proper authorization, potentially gaining unauthorized access to sensitive privileged credentials or systems managed by these platforms. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N), increasing its risk profile. The CVSS v3.1 base score of 8.1 indicates high severity, with high impact on confidentiality and integrity but no impact on availability. Although no public exploits are currently known, the vulnerability’s nature and the critical role of these products in managing privileged access make it a significant threat. The lack of patches at the time of reporting necessitates immediate attention to access controls and monitoring. The vulnerability affects all versions prior to 8202 for PAM360, prior to 13221 for Password Manager Pro, and prior to 4401 for Access Manager Plus, indicating a broad impact across multiple widely used enterprise security products.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security of privileged credentials and access management systems. Successful exploitation could lead to unauthorized remote sessions, enabling attackers to access sensitive systems, escalate privileges, and potentially move laterally within networks. This threatens the confidentiality and integrity of critical data and systems, especially in sectors such as finance, healthcare, government, and critical infrastructure where privileged access management is vital. The absence of known exploits reduces immediate risk but does not diminish the urgency due to the ease of exploitation and high impact. Organizations relying on these Zohocorp products may face regulatory and compliance risks under GDPR and other data protection laws if breaches occur. The vulnerability could also undermine trust in managed services and IT operations, leading to operational disruptions and reputational damage.
Mitigation Recommendations
1. Immediately inventory and identify all instances of ManageEngine PAM360, Password Manager Pro, and Access Manager Plus within the organization. 2. Apply vendor patches as soon as they become available; monitor Zohocorp advisories closely. 3. Until patches are applied, restrict network access to the management interfaces using network segmentation, firewalls, and VPNs to limit exposure. 4. Enforce strict role-based access controls (RBAC) and review user privileges to ensure minimal necessary permissions, especially for initiating remote sessions. 5. Enable and monitor detailed logging and alerting on remote session initiation activities to detect anomalous or unauthorized attempts. 6. Conduct penetration testing and vulnerability scanning focused on these products to identify potential exploitation paths. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving privileged access compromise. 8. Consider deploying additional endpoint detection and response (EDR) tools to detect lateral movement stemming from compromised privileged sessions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zohocorp
- Date Reserved
- 2025-10-13T04:36:27.412Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6966562fa60475309f43a465
Added to database: 1/13/2026, 2:26:55 PM
Last enriched: 1/13/2026, 2:41:07 PM
Last updated: 1/13/2026, 3:28:45 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36640: CWE-269 Improper Privilege Management in Tenable Nessus Agent
HighCVE-2026-22755: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330
CriticalCVE-2025-55462: n/a
CriticalCVE-2025-13774: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Progress Software Flowmon ADS
HighCVE-2026-0892: Vulnerability in Mozilla Firefox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.