November 2024 Patch Tuesday comes with fixes for 89 vulnerabilities including 4 zero-days
Hey folks, Microsoft's November 2024 Patch Tuesday has released updates for the four following zero-days: 1) CVE-2024-43451 Vulnerable component: Windows NTLM Impact: Spoofing CVSS 3.1: 6.5 This critical zero-day vulnerability enables attackers to capture
Vulnerability age matrix
under the threats and vulnerabilities dashboard. The Vulnerability age matrix starts at >30 days is there anywhere in the system I can change this to to >14 days
Compliance Dashboard in EndPoint Central..
Hi Team, Is there any report or dashboard in Endpoint Central that can be utilized for baseline compliance? Basically, we have 3 critical software need to be installed on all devices. So we would need to make a dashboard that can show the status. please
Azul Zuku Updates for Secure Gateway Server
I’ve been trying to get somebody to update the Azul Java version on the Secure Gateway Server but I’ve reported it 5 or 6 weeks ago and no updates have happened as of yet, I’ve installed 90108 and it still hasn’t been updated. If a patch is not forthcoming
UEM Not Associating Patches to Systems
We were checking that latest release of patches were being deployed, and found an Issue with at least a couple. Many of our Windows 11 were not receiving a couple patches. Cumulative Update Win11 .Net (KB5039895) Cumulative Update Win11 23H2 (KB5040442)
Critical vulnerability CVE-2024-3094 in XZ Utils: Everything you need to know!
Hello everyone! This forum talks in detail about the critical vulnerability CVE-2024-3094 which affects the XZ Utils, a widely used library found in both Mac and Linux distributions. About the critical vulnerability Tracked as CVE-2024-3094, this vulnerability
Curl for Windows vulnerabilities all of the sudden
yesterday there was a Curl for Windows vulnerability published. and most of my PCs have this? We use FortiEDR and maybe one of its tools is Curl? (edit; doesn't seem to be related to our EDR) is there a way to show exactly why the vulnerability is detected
[Zero-day] Microsoft release updates for 5 zero-days on November 2023's Patch Tuesday
Hello everyone! Microsoft has published updates for a total of 63 vulnerabilities in this Patch Tuesday. Of the total, 5 of these have been classified as zero-days. Here are the details of the zero days: CVE ID Description CVE-2023-36025 Windows SmartScreen
Log4j2
Please can you confirm whether Desktop Central is affected by CVE-2021-44228? It looks like it uses Apache Struts so I thought there was a possibility it could be vulnerable.
[Zero-day] Microsoft release updates for 3 zero-days on October 2023's Patch Tuesday
Hey everyone, Microsoft has published updates for a total of 104 vulnerabilities in this Patch Tuesday. Of the total, 3 of these have been classified as zero-days. Here are the details of the zero days: CVE ID Description CVE-2023-44487 HTTP/2 Rapid Reset
How do I disable the threats part of "Threats & Patches"?
I have zero interest in the threats/vulnerability scanning of Endpoint Central, I'm perfectly happy with just the patching side, so I would like to disable threat/vulnerability scans etc entirely. How? This should never have been enabled by default on
High Risk Software End Of Life - Exemption?
Internet Explorer 11 is quite rightly being reported as a High Risk software vulnerability in MEEC. We have implemented a Domain GPO at machine level to negate the issue which changes the reg key HKLM\Software\Policies\Microsoft\Internet Explorer\Main\NotifyDisableIEOptions
Lots of old Excel vulnerabilities all of the sudden
In the last 24 hours I've had 50 systems showing tons of Excel vulnerabilities in Endpoint Central. vulnerabilities date form 2018 to 2023. I don't get it. I think they might be false positives. anyway to check? anyone else?
EndPoint Central Not Picking Up Vulnerabilities
I have just installed a new application on end user devices and this is showing that some devices still have serious vulnerabilities despite EndPoint Central saying they are Healthy. How does EndPoint Central not pick that a version of iTunes has 13 CVE
A security patch released for Endpoint Central on-premises users with Jira Cloud integration
Hello all! This notification is in regard to an improper authentication issue that was internally identified and patched in Endpoint Central instances with Jira Cloud integration on June 24, 2022. Note: This is only applicable to Endpoint Central
[Zero-day] Microsoft Security Diagnostic Tool vulnerability causes RCE - Workaround released
Hey everyone, This forum post is to notify about a zero-day vulnerability that has been reported in Microsoft Security Diagnostic Tool [CVE-2022-30190]. Discovered by an independent cybersecurity researcher team nao_sec, the flaw has been dubbed as Follina.
Spring4Shell vulnerability (CVE-2022-22965) - Vulnerability Detection using Desktop Central (on-premise) with VMP / Endpoint Security add-on
*This forum post will be updated periodically based on the data updated by Spring. The recently identified Spring4Shell vulnerability (CVE-2022-22965) is classified as a zero-day vulnerability. Present in the Spring Framework, this vulnerability can
Spring4Shell RCE vulnerability [CVE-2022-22965] - All you need to know
About the vulnerability: Tracked by CVE-2022-22965, the Spring4Shell is a zero-day vulnerability arising in the Spring Core Framework. CVE ID Description Impact CVE-2022-22965 Remote Code Execution Zero-day * The CVE-2022-22965 has been published. **
A critical security patch released in Desktop Central and Desktop Central MSP for CVE-2021-44757
Hello all! This notification is in regard to an authentication bypass vulnerability that was recently identified and fixed in Desktop Central and Desktop Central MSP. Registered as CVE-2021-44757, this vulnerability has now been fixed and released in
Security Update - Fix available for a privilege escalation vulnerability
Hello all! This notification is in regard to an elevation of privilege vulnerability (CVE-2022-23863) that was recently identified and fixed in Desktop Central and Desktop Central MSP. Please find the details and mitigation steps below. Vulnerability
ngix log4j vulnerability
Hello, We see attempts to exploit log4j in the Secure Gateway server, it is related to nginx process. This happens even after patching Secure Gateway to latest version. Is this nginx patched against log4j? installed nginx version is 1.19.9.1 Regards.
Can't Patch Desktop Central Log4J vulnerability becuase Manage hasn't re-uped our contract
We sent a check to Manage Engine about 2 months ago and we still have yet to get our contract renewed. Now the Log4J vulnerability attached to Desktop Central is on every single one of our computers. Is there any way to download and install this patch
An authentication bypass vulnerability identified and fixed in Desktop Central and Desktop Central MSP
Hello! This notification is in regard to an authentication bypass vulnerability that was recently identified in Desktop Central. This applies to Desktop Central MSP as well. Registered as CVE-2021-44515, this vulnerability has now been fixed and released
Chrome misconfigurations in MEDC + Endpoint Protection (vulnerability scanning) need to be updated
After finding more Chrome misconfiguration errors it's pretty clear these rules are based on an outdated version of the Unified Compliance Framework Google Chrome configuration guide (by Network Frontiers). There is an updated version of that guide here
Another deprecated Chrome security misconfiguration
The "Webpages are allowed to run Flash plugins automatically" security misconfiguration is no longer valid for Chrome (Flash has been removed since v88) and should probably be removed as a misconfiguration in MEDC/EP add-on. See documentation from Google:
Deprecated Chrome security misconfiguration
The "Outdated plugins are allowed to run" security misconfiguration is no longer valid for Chrome (policy has been deprecated since v88) and should probably be removed as a misconfiguration in MEDC/EP add-on. If enabled, loading chrome://policy/ in current
Endpoint Security add-on and the "Antivirus not installed" misconfiguration
I'm running a trial for MEDC with the Endpoint Security addon enabled and I'm not clear on one of the misconfiguration exceptions included. The tile of the exception is: Antivirus (not considering Windows Defender) not installed Does this mean any system
DC Vulnerability Reports
We just upgraded to the latest version of Desk Top Central. Previously, we could run reports: 1. ExecutiveThreatSummary 2. HighPriorityReports 3. ExecutiveAssetSummary 4. ExecutivePatchSummary. Where did they go with this new version? I see you have
SonicWall SMA 100 zero day vulnerability - details and mitigation steps
Following a sophisticated cyberattack against its internal systems, SonicWall, a pure-play cybersecurity vendor revealed a zero-day vulnerability in its SMB-oriented remote access product called Secure Mobile Access (SMA). Only the SMA 100 Series remains
Fixes to Multiple Vulnerabilities
The following list of vulnerabilities reported by Tomasz Kuczyński have been fixed in Desktop Central. S.No Vulnerability Details 1 Basic authentication in the agent - server communication has been enhanced by Client Certification Authentication. 2 Improper
Security Update - Cross-Site Scripting Vulnerability fix for Desktop Central
A vulnerability with the name Cross-site scripting on the DomainList page under proxy settings was discovered and reported by Walter This Cross-site scripting Vulnerability has been mitigated and has been released on November 4, 2020. Follow the below
Security Update - Ghostcat Vulnerability prevention for Desktop Central
A vulnerability with the name Ghostcat in Apache Tomcat (CVE 2020-1938), which is a third-party component used by Desktop Central was discovered by external security researchers of Chaitin Tech. This Ghostcat Vulnerability has been mitigated and has been released for ManageEngine Desktop Central. Follow the below given steps to prevent this vulnerability in Desktop Central Servers. Log in to your Desktop Central console, click on your current build number on the top right corner. You can find the
Security Update - ManageEngine Desktop Central (Remote Code Execution - Fixed)
Hello Everyone, The remote code execution vulnerability in Desktop Central (CVE-2020-10189) has been fixed in build 10.0.479. The new hotfix is available at https://www.manageengine.com/products/desktop-central/service-packs.html For more information about the vulnerability, please visit https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html Please contact support for any clarification or the assistance. Thank you.
Zero-Day Vulnerability - Desktop Central - March 6th, 2020
Is there any information regarding the zero-day vulnerability for Desktop Central that was announced today via the article: https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/ ? Any guidance yet?
Modify existing scheduled report - PC
I have an installation on a Windows Server with a similar problem as Here but on Desktop Central. It's a scheduled report that is emailed out to a user who is no longer in the company. I'd like to modify the report but I can't find it in the 'scheduled reports' section. The report is labelled "Patch Vulnerability Database Report" but I'm not sure that is relevant to the issue. There is only one login to Desktop Central, that is the admin login and this is the only report running. The solution in
Logs issue fixed - Update to the latest hotfix
There was a password printing issue in our logs, which is now fixed. There's no printing of critical data in the logs any more, we have ensured with thorough testing that the logs are cleared of any passwords. Our customers can upgrade to the latest hotfixes as applicable. Security is our foremost priority, and we will strive to upkeep our users' security. Thanks for your understanding and continued support. Request users to update to the latest builds. You can learn about it here. https://www.manageengine.com/products/desktop-central/vulnerability-in-log-files.html
Security Update - ManageEngine Desktop Central (fixed & released Multiple Vulnerabilities)
Hello everyone, Greetings. Desktop Central has fixed and released Multiple Vulnerabilities reported in Desktop Central. Vulnerabilities Fixed are CVE-2018-5337, CVE-2018-5338, CVE-2018-5339, CVE-2018-5340, CVE-2018-5341. Latest fix released on 24th April 2018. Here are the knowledge base links for your reference https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html https://www.manageengine.com/products/desktop-central/query-restriction-bypass-vulnerability.html
Do you have a Windows 10 PC running the Anniversary update? Time to upgrade.
End of life announcements: 1. Windows 10 version 1607 (Anniversary update) for Home and Pro users Mainstream support ends: April 10, 2018 Extended support ends: Oct. 9, 2018 2. Windows 10 version 1511 (First major feature update from Windows 10) for Education and enterprise editions Mainstream support ends: Oct. 10, 2017 Extended support ends: Apr 10, 2018 Points to note: 1. Windows 10 Enterprise and Education editions will still receive six months of additional servicing for version 1607.
Security Update - ManageEngine Desktop Central (Remote Code Execution - Fixed)
Hello everyone, Greetings. Patches have been released for a remote code execution vulnerability reported by DDI Vulnerability Research in Desktop Central, Desktop Central MSP and Patch Manager Plus products. This vulnerability allows any user in the network to upload files and execute commands on above mentioned Installed machine. The fixed versions of the above-mentioned products are available in below build numbers. 1. Desktop Central - Fixed in version 10.0.181 2. Desktop Central MSP - Fixed
Security Update - ManageEngine Desktop Central
Dear Users, Wishing everyone a happy and productive New Year. Quick security update on password encryption violation in Desktop Central and MSP products. Any user who can access the Desktop Central Server computer can acquire specific passwords in Desktop Central has been handled and released in build 100157. #securityupdate-dc For more details, Desktop Central https://www.manageengine.com/products/desktop-central/password-encryption-policy-violation.html Desktop Central MSP https://www.manageengine.com/desktop-management-msp/password-encryption-policy-violation.html