
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-41833 is a critical security vulnerability affecting Zoho ManageEngine Patch Connect Plus versions before build 90099. The vulnerability was discovered and disclosed in October 2021, allowing unauthenticated remote code execution on affected systems (NVD, Vendor Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type). This indicates that the vulnerability requires no privileges or user interaction to exploit, and can be accessed from the network with low attack complexity (NVD).
The vulnerability allows attackers to execute remote code on affected systems without requiring any authentication. This could lead to complete system compromise, with potential impacts including unauthorized access to sensitive data, system modification, and service disruption (NVD).
Zoho has released a fix for this vulnerability in build 90099. Organizations using affected versions of ManageEngine Patch Connect Plus should immediately upgrade to this version or later to address the vulnerability (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."