CVE-2025-9223

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on ManageEngine Applications Manager servers. Attackers with valid credentials can exploit improper input validation in the execute program action feature to gain remote code execution. All organizations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine Applications Manager
Versions: Versions 178100 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the application. The execute program action feature must be accessible to the authenticated user.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, lateral movement, ransomware deployment, or complete server takeover.

🟠

Likely Case

Attackers with stolen or compromised credentials execute commands to establish persistence, exfiltrate data, or deploy malware.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly accessible to attackers who obtain credentials.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 178101 or later

Vendor Advisory: https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2025-9223.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine website. 2. Backup current installation. 3. Stop the Applications Manager service. 4. Install the update. 5. Restart the service.

🔧 Temporary Workarounds

Disable Execute Program Action

all

Remove or restrict access to the vulnerable feature in the application configuration.

Navigate to Admin -> General Settings -> Execute Program Action and disable or restrict permissions

Network Segmentation

all

Restrict network access to Applications Manager to only trusted IP addresses.

firewall rules to limit access to specific source IPs

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all administrative accounts.
  • Monitor and audit all execute program actions and command execution attempts in application logs.

🔍 How to Verify

Check if Vulnerable:

Check the Applications Manager version in the web interface under Help -> About.

Check Version:

Check via web interface or examine version.txt in installation directory.

Verify Fix Applied:

Verify version is 178101 or higher and test that execute program action properly validates input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual execute program actions
  • Suspicious command execution patterns
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from Applications Manager server
  • Command and control traffic patterns

SIEM Query:

source="applications_manager" AND (event="execute_program" OR command="*" ) | stats count by user, command

🔗 References

📤 Share & Export