CVE-2025-11248
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2025-10-28

Assigner: ManageEngine

Description
ZohoCorp ManageEngine Endpoint Central versions prior to 11.4.2528.05 are vulnerable to a sensitive information logging issue. An authenticated user with access to the logs could potentially obtain the sensitive agent token.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2025-10-28
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zohocorp manageengine_endpoint_central to 11.4.2528.05 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in ZohoCorp ManageEngine Endpoint Central versions prior to 11.4.2528.05 involves a sensitive information logging issue where an authenticated user with access to logs could potentially obtain the sensitive agent token. Additionally, there was a risk that such a user could replay valid requests due to insufficient validation in the log handling mechanism. The issue was addressed by improving log validation to prevent replay attacks. [1]


How can this vulnerability impact me? :

If exploited, an authenticated user with access to logs could obtain sensitive agent tokens and potentially replay valid requests, which might allow unauthorized actions or access within the system. Although no actual misuse has been reported, this could lead to unauthorized access or manipulation of the Endpoint Central agent's operations. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying the version of the ManageEngine Endpoint Central agent installed on your system. Specifically, check if the build number is prior to 11.4.2528.05. Since the issue involves sensitive information being logged, reviewing the logs for exposure of sensitive agent tokens by an authenticated user with log access may also help. However, no specific detection commands are provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade your ManageEngine Endpoint Central agent to build 11.4.2528.05 or later. This involves logging into the Endpoint Central console, checking the current build number, downloading the latest Patch Package Manager (PPM) for your build, and applying the update. If further assistance is needed, contact ManageEngine support at [email protected]. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart