U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-29081

Change History

Initial Analysis by NIST 5/10/2022 8:29:22 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.0:build4000:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4100:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.1:build4101:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4200:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4201:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4202:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.2:build4203:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4300:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_access_manager_plus:4.3:build4301:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_pam360:5.4:build5400:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:11104:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11101:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11102:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.1:build_11103:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:11200:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:11201:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11300:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.3:build11301:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12000:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12001:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12002:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12003:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12004:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12005:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_password_manager_pro:12.0:build12006:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-863
Changed Reference Type
https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html No Types Assigned
https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html Vendor Advisory
Changed Reference Type
https://www.tenable.com/security/research/tra-2022-14 No Types Assigned
https://www.tenable.com/security/research/tra-2022-14 Exploit, Third Party Advisory