# Security Updates - CVE-2020-12116 ## CVE-2020-12116 ### Path Traversal vulnerability | Vulnerability Details | | |---|---| | Impact | **CVSS V3 rating: NA** | | Reported | 22th April 2020 | | Reported by | R.J. McDown, an independent security researcher | | Fixed | 29th April 2020 | | Affected Builds | → Builds till 124195
→ Builds 125000 - 125124 | | Fixed in | Builds 124196/125125 | | Overview | Path Traversal vulnerability in URLs starting with | | **Recommended Fix** | **→ For builds till 124195, please upgrade to [OpUtils version 12.4.196](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) or above.**

**→ For builds 125000 - 125124, please upgrade to [OpUtils version 12.5.125](https://www.manageengine.com/network-monitoring/29809517/ManageEngine_OpManager_12_0_SP-5_1_2_5.ppm).** | ### Description A path traversal vulnerability was recently reported, which enabled unrestricted access to any file in the product directory. This has been fixed. We recommend that you upgrade to [OpUtils version 12.4.196](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) / [OpUtils version 12.5.125](https://www.manageengine.com/network-monitoring/29809517/ManageEngine_OpManager_12_0_SP-5_1_2_5.ppm) (for builds 125000 - 125124) or contact our support team at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com) to fix this issue. **Source and Acknowledgements** Find out more about CVE-2020-12116 from the [CVE dictionary](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12116). ### Need Help? For clarification or corrections please contact our [support team](https://www.manageengine.com/network-monitoring/support.html) or email us at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com)