CVE-2025-11669

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authorization controls in ManageEngine's privileged access management products when initiating remote sessions. Attackers could gain unauthorized access to remote systems managed by these platforms. Organizations using vulnerable versions of ManageEngine PAM360, Password Manager Pro, or Access Manager Plus are affected.

💻 Affected Systems

Products:
  • ManageEngine PAM360
  • Password Manager Pro
  • Access Manager Plus
Versions: PAM360 before 8202, Password Manager Pro before 13221, Access Manager Plus before 4401
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with remote session functionality enabled are vulnerable. The vulnerability affects the core authorization mechanism for remote sessions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized access to all remote systems managed by the vulnerable platform, potentially compromising critical infrastructure, stealing credentials, and establishing persistent access.

🟠

Likely Case

Attackers with some level of access could escalate privileges to access additional remote systems beyond their authorized scope, leading to lateral movement and credential theft.

🟢

If Mitigated

With proper network segmentation, strong authentication, and monitoring, impact would be limited to isolated segments with detection of unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the management interface but bypasses authorization checks for remote sessions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAM360 8202, Password Manager Pro 13221, Access Manager Plus 4401

Vendor Advisory: https://www.manageengine.com/privileged-access-management/advisory/cve-2025-11669.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine's official website. 2. Backup your current installation and configuration. 3. Stop the ManageEngine service. 4. Install the update following vendor instructions. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Disable Remote Session Functionality

all

Temporarily disable remote session initiation capabilities until patching can be completed

Restrict Network Access

all

Limit access to the management interface to only authorized IP addresses and networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from critical infrastructure
  • Enhance monitoring and alerting for unauthorized remote session attempts

🔍 How to Verify

Check if Vulnerable:

Check the product version in the web interface under Help > About or via the admin console

Check Version:

Check via web interface or consult product documentation for CLI version check

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the fix section

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized remote session initiation attempts
  • Failed authorization checks for remote access
  • Unusual patterns of remote session connections

Network Indicators:

  • Unexpected outbound connections from the management server to remote systems
  • Unusual traffic patterns during non-business hours

SIEM Query:

source="manageengine" AND (event_type="remote_session" OR event_type="authorization_failure") AND result="success" WHERE user NOT IN authorized_users

🔗 References

📤 Share & Export