# Security Updates - CVE-2021-43319 There was a command injection vulnerability in the ipaddress/hostname field of the ping functionality. This vulnerability is specific to the configuration management module only. ## Vulnerability Details | Field | Details | |---|---| | Severity | High | | Reported | 16 Oct 2021 | | Reported by | Nam (aka m3) from ECQ | | Fixed | 28-Oct-2021 | | Affected Builds | → Builds 125458 to 125472
→ Builds 125456 and below | | Fixed in | → Build 125457
→ Build 125473 | | Overview | There was a command injection vulnerability in the ipaddress/hostname field of the ping functionality. This vulnerability is specific to the configuration management module only. | | Recommended Fix | **→ For builds below 125456, please upgrade to [version 125457](https://www.manageengine.com/network-monitoring/service-packs.html) here.**

**→ For builds 125458 to 125472 and please upgrade to [the version 125473 here.](https://www.manageengine.com/network-monitoring/itom-servicepack.html)** | ## Description Earlier, there was a Remote Code Execution (RCE) vulnerability in the Ping functionality. This issue has been fixed now. We recommend that you [upgrade to the latest version of OpManager](https://www.manageengine.com/network-monitoring/service-packs.html) or contact our support team at [itom-upgrades@manageengine.com](mailto:itom-upgrades@manageengine.com) to fix this issue. ## Source and Acknowledgements Find out more about CVE-2021-43319 from the [CVE dictionary.](https://nvd.nist.gov/vuln/detail/CVE-2021-43319) ## Need Help? For clarification or corrections please contact our [support team](https://www.manageengine.com/network-monitoring/support.html) or email us at [itom-upgrades@manageengine.com](mailto:itom-upgrades@manageengine.com).