Security updates on vulnerabilities

This page lists security vulnerability fixes made in Device Control Plus.

Follow general security recommendations to fortify your Device Control Server.

CVESynopsisSeverity
USB debugging: Unsupported device type issueAllows Android mobile devices to access the system despite an active Block policy.LOW
Privilege Escalation VulnerabilityA Privilege Escalation vulnerability raised in ManageEngine Bug Bounty program.HIGH
Authenticated SQL Injection Vulnerability (CVE-2022-47523)A SQL injection (SQLi) vulnerability.CRITICAL
CVE-2020-1968The Raccoon attack exploits a flaw in the TLS specification.LOW
CVE-2020-13943HTTP/2 pseudo headers.MEDIUM
CVE-2020-9490A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request resulted in a crash.HIGH
CVE-2020-13935Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.HIGH
CVE-2020-13934OutOfMemoryException leads to a denial of service.HIGH
CVE-2020-14350PostgreSQL extensions did not use search_path safely in their installation script.HIGH
CVE-2020-11984Integer overflow in the mod_proxy_uwsgi.CRITICAL
CVE-2020-11993Concurrent use of memory pools on the HTTP/2 module.HIGH
Integer Overflow Vulnerability (CVE-2020-15588)Integer overflow in InternetSendRequestEx and InternetSendRequestByBitrate leading to a heap-based buffer overflow and Remote Code Execution with SYSTEM privileges.CRITICAL
CVE-2020-11996Triggers high CPU usage for several seconds, rendering the server unresponsive.HIGH
CVE-2020-9484Allows any anonymous attacker with internet access to submit a malicious request to a Tomcat Server that has PersistentManager enabled using FileStore.HIGH
Remote Code Execution Vulnerability (CVE-2021-44228)Allows malicious users to execute arbitrary code on a machine or pod loaded from LDAP servers by using a bug found in the log4j library.CRITICAL