CVE-2025-11670: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Zohocorp ManageEngine ADManager Plus
Zohocorp ManageEngine ADManager Plus versions before 8025 are vulnerable to NTLM Hash Exposure. This vulnerability is exploitable only by technicians who have the “Impersonate as Admin” option enabled.
AI Analysis
Technical Summary
CVE-2025-11670 is a vulnerability identified in Zohocorp's ManageEngine ADManager Plus, a widely used Active Directory management tool. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, the vulnerability allows the exposure of NTLM hashes, which are hashed representations of Windows credentials. The flaw exists in versions before 8025 and is exploitable only by technicians who have the “Impersonate as Admin” option enabled, meaning that the attacker must already have some level of privileged access within the system. The vulnerability can be exploited remotely over the network (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). Although no known exploits have been observed in the wild, the exposure of NTLM hashes can lead to credential theft, enabling attackers to perform lateral movement, privilege escalation, or persistence within an enterprise network. This is particularly concerning in environments where ADManager Plus is used to manage Active Directory, a critical component of enterprise identity and access management. The vulnerability underscores the importance of controlling privileged access and securing sensitive credential information within administrative tools.
Potential Impact
For European organizations, the exposure of NTLM hashes through this vulnerability can lead to significant security risks. Attackers who gain access to these hashes can perform pass-the-hash attacks, enabling lateral movement across networks and potentially compromising multiple systems. This undermines the confidentiality and integrity of enterprise credentials and can facilitate further attacks such as privilege escalation or data exfiltration. Organizations relying heavily on ManageEngine ADManager Plus for Active Directory management, especially those in sectors like finance, government, healthcare, and critical infrastructure, face increased risk. The vulnerability could disrupt trust in identity management and lead to regulatory compliance issues under GDPR if sensitive information is compromised. Additionally, the requirement that the attacker have “Impersonate as Admin” privileges means insider threats or compromised technician accounts pose a particular danger. The medium severity rating suggests that while the vulnerability is not trivially exploitable by external attackers without privileges, the impact within compromised environments can be substantial.
Mitigation Recommendations
To mitigate CVE-2025-11670, European organizations should: 1) Immediately restrict the “Impersonate as Admin” permission to only the most trusted and necessary technicians, implementing strict access controls and regular reviews of privileged accounts. 2) Monitor and audit all activities performed by users with impersonation privileges to detect anomalous behavior indicative of exploitation attempts. 3) Apply the official patch or update to ManageEngine ADManager Plus version 8025 or later as soon as it becomes available from Zohocorp. 4) Employ network segmentation and least privilege principles to limit the exposure of administrative tools and credentials. 5) Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. 6) Implement robust logging and alerting mechanisms to detect pass-the-hash or lateral movement techniques within the network. 7) Educate IT staff about the risks associated with privileged access and the importance of safeguarding credentials. These steps go beyond generic advice by focusing on privilege management, monitoring, and timely patching specific to the context of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-11670: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Zohocorp ManageEngine ADManager Plus
Description
Zohocorp ManageEngine ADManager Plus versions before 8025 are vulnerable to NTLM Hash Exposure. This vulnerability is exploitable only by technicians who have the “Impersonate as Admin” option enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-11670 is a vulnerability identified in Zohocorp's ManageEngine ADManager Plus, a widely used Active Directory management tool. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, the vulnerability allows the exposure of NTLM hashes, which are hashed representations of Windows credentials. The flaw exists in versions before 8025 and is exploitable only by technicians who have the “Impersonate as Admin” option enabled, meaning that the attacker must already have some level of privileged access within the system. The vulnerability can be exploited remotely over the network (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). Although no known exploits have been observed in the wild, the exposure of NTLM hashes can lead to credential theft, enabling attackers to perform lateral movement, privilege escalation, or persistence within an enterprise network. This is particularly concerning in environments where ADManager Plus is used to manage Active Directory, a critical component of enterprise identity and access management. The vulnerability underscores the importance of controlling privileged access and securing sensitive credential information within administrative tools.
Potential Impact
For European organizations, the exposure of NTLM hashes through this vulnerability can lead to significant security risks. Attackers who gain access to these hashes can perform pass-the-hash attacks, enabling lateral movement across networks and potentially compromising multiple systems. This undermines the confidentiality and integrity of enterprise credentials and can facilitate further attacks such as privilege escalation or data exfiltration. Organizations relying heavily on ManageEngine ADManager Plus for Active Directory management, especially those in sectors like finance, government, healthcare, and critical infrastructure, face increased risk. The vulnerability could disrupt trust in identity management and lead to regulatory compliance issues under GDPR if sensitive information is compromised. Additionally, the requirement that the attacker have “Impersonate as Admin” privileges means insider threats or compromised technician accounts pose a particular danger. The medium severity rating suggests that while the vulnerability is not trivially exploitable by external attackers without privileges, the impact within compromised environments can be substantial.
Mitigation Recommendations
To mitigate CVE-2025-11670, European organizations should: 1) Immediately restrict the “Impersonate as Admin” permission to only the most trusted and necessary technicians, implementing strict access controls and regular reviews of privileged accounts. 2) Monitor and audit all activities performed by users with impersonation privileges to detect anomalous behavior indicative of exploitation attempts. 3) Apply the official patch or update to ManageEngine ADManager Plus version 8025 or later as soon as it becomes available from Zohocorp. 4) Employ network segmentation and least privilege principles to limit the exposure of administrative tools and credentials. 5) Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. 6) Implement robust logging and alerting mechanisms to detect pass-the-hash or lateral movement techniques within the network. 7) Educate IT staff about the risks associated with privileged access and the importance of safeguarding credentials. These steps go beyond generic advice by focusing on privilege management, monitoring, and timely patching specific to the context of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zohocorp
- Date Reserved
- 2025-10-13T04:36:28.773Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693fedd0d9bcdf3f3dd41433
Added to database: 12/15/2025, 11:15:28 AM
Last enriched: 12/22/2025, 12:18:02 PM
Last updated: 2/7/2026, 7:22:12 AM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.