{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-07-10T19:55:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://srcincite.io/advisories/src-2020-0011/"},{"tags":["x_refsource_MISC"],"url":"https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/"},{"tags":["x_refsource_MISC"],"url":"https://srcincite.io/pocs/src-2020-0011.py.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html"},{"tags":["x_refsource_MISC"],"url":"https://cwe.mitre.org/data/definitions/502.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-10189","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://srcincite.io/advisories/src-2020-0011/","refsource":"MISC","url":"https://srcincite.io/advisories/src-2020-0011/"},{"name":"https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/","refsource":"MISC","url":"https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/"},{"name":"https://srcincite.io/pocs/src-2020-0011.py.txt","refsource":"MISC","url":"https://srcincite.io/pocs/src-2020-0011.py.txt"},{"name":"https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html","refsource":"CONFIRM","url":"https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html"},{"name":"http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html"},{"name":"https://cwe.mitre.org/data/definitions/502.html","refsource":"MISC","url":"https://cwe.mitre.org/data/definitions/502.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:58:39.095Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://srcincite.io/advisories/src-2020-0011/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://srcincite.io/pocs/src-2020-0011.py.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cwe.mitre.org/data/definitions/502.html"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2020-10189","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-04T20:01:34.928751Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-10189"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-10189","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data"}]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2020-10189 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:49.767Z"}}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2020-10189","datePublished":"2020-03-06T16:05:22.000Z","dateReserved":"2020-03-06T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:49.767Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}