# Security Updates - CVE-2020-28653 ## CVE-2020-28653 ### Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet. | Vulnerability Details | | |---|---| | Impact | **CVSS V3 rating: 10 (High)** | | Reported | 7th November, 2020 | | Reported by | Johannes Mortiz, an independent Security researcher | | Fixed | 13th November, 2020 | | Affected Builds | → Builds 12.1.000 & above | | Fixed in | Builds 12.5.203 / 12.5.218 | | Overview | Unauthenticated remote code execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet. | | Recommended Fix | **→ For builds 12.1.000 & above, please upgrade to [OpUtils version 12.5.203](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) or above.**

**→ For builds 12.5.204 - 12.5.217, please upgrade to [OpUtils version 12.5.128.](https://www.manageengine.com/network-monitoring/29809517/ManageEngine_OpManager_12_0_SP-5_2_1_8.ppm?CVE-28653)** | ### Description Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet. We recommend that you upgrade to [OpUtils version 12.5.203](https://www.manageengine.com/products/oputils/service-packs.html?12116cve) or contact our support team at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com) to fix this issue. ### Source and Acknowledgements Find out more about CVE-2020-28653 from the [CVE dictionary](https://nvd.nist.gov/vuln/detail/CVE-2020-28653). ### Need Help? For clarification or corrections please contact our [support team](https://www.manageengine.com/network-monitoring/support.html) or email us at [oputils-support@manageengine.com](mailto:oputils-support@manageengine.com).