# Security Updates - CVE-2020-28653
## CVE-2020-28653
### Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet.
| Vulnerability Details | |
|---|---|
| Impact | **CVSS V3 rating: 10 (High)** |
| Reported | 7th November, 2020 |
| Reported by | Johannes Mortiz, an independent Security researcher |
| Fixed | 13th November, 2020 |
| Affected Builds | → Builds 12.1.000 & above |
| Fixed in | Builds 12.5.203 / 12.5.218 |
| Overview | Unauthenticated remote code execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet. |
| Recommended Fix | **→ For builds 12.1.000 & above, please upgrade to [OpUtils version 12.5.203](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) or above.**
**→ For builds 12.5.204 - 12.5.217, please upgrade to [OpUtils version 12.5.128.](https://www.manageengine.com/network-monitoring/29809517/ManageEngine_OpManager_12_0_SP-5_2_1_8.ppm?CVE-28653)** |
### Description
Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet.
We recommend that you upgrade to [OpUtils version 12.5.203](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) or contact our support team at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com) to fix this issue.
### Source and Acknowledgements
Find out more about CVE-2020-28653 from the [CVE dictionary](https://nvd.nist.gov/vuln/detail/CVE-2020-28653).
### Need Help?
For clarification or corrections please contact our [support team](https://www.manageengine.com/network-monitoring/support.html) or email us at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com).