{"api_version":"1","generated_at":"2026-04-24T03:09:31+00:00","cve":"CVE-2020-15589","urls":{"html":"https://cve.report/CVE-2020-15589","api":"https://cve.report/api/cve/CVE-2020-15589.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-15589","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-15589"},"summary":{"title":"CVE-2020-15589","description":"A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-10-02 20:15:00","updated_at":"2021-12-06 16:50:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://www.manageengine.com/products/desktop-central/","name":"https://www.manageengine.com/products/desktop-central/","refsource":"MISC","tags":["Product","Vendor Advisory"],"title":"Remote Windows Desktop Management and Desktop Administration Software - ManageEngine Desktop Central","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.manageengine.com/products/desktop-central/untrusted-agent-server-communication.html","name":"https://www.manageengine.com/products/desktop-central/untrusted-agent-server-communication.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Untrusted Agent Server Communication| ManageEngine Desktop Central","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-15589","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15589","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"15589","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_desktop_central","cpe6":"10.0.552.w","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15589","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_desktop_central","cpe6":"10.0.552.w","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15589","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_remote_access_plus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-15589","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.manageengine.com/products/desktop-central/","refsource":"MISC","name":"https://www.manageengine.com/products/desktop-central/"},{"refsource":"CONFIRM","name":"https://www.manageengine.com/products/desktop-central/untrusted-agent-server-communication.html","url":"https://www.manageengine.com/products/desktop-central/untrusted-agent-server-communication.html"}]}},"nvd":{"publishedDate":"2020-10-02 20:15:00","lastModifiedDate":"2021-12-06 16:50:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.552.w:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1.2119.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"15589","Ordinal":"176976","Title":"CVE-2020-15589","CVE":"CVE-2020-15589","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"15589","Ordinal":"1","NoteData":"A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"15589","Ordinal":"2","NoteData":"2020-10-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"15589","Ordinal":"3","NoteData":"2021-11-30","Type":"Other","Title":"Modified"}]}}}