# Security Updates - CVE Details - CVE-2019-15106 ## CVE-2019-15106 ### Unauthenticated Remote Command Execution in Applications Manager Plugin | Vulnerability Details | | |---|---| | Impact | **CVSS V3 rating: 9.8 CRITICAL** | | Fixed | 20 August 2019 | | Affected Builds | Till Build 14300 | | Fixed in | Build 14310 | | Overview | Unauthenticated Remote Command Execution in Applications Manager Plugin. | | **Recommended Fix** | **Upgrade to Applications Manager Plugin to version 14310 or above.** | ## Description- Security Update - CVE-2019-15106 Database An issue was discovered in Zoho ManageEngine OpManager with Applications Manager Plugin through 12.4x. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm. We recommend you to upgrade Applications Manager Plugin to version 14310 or above and OPM to the latest version to fix this issue. ### Source and Acknowledgements Find out more about CVE-2019-15106 from [CVE Directory](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15106) and [NIST NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-15106). Other Resources: [https://www.pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html](https://www.pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html) ### Need Help? For clarification or corrections please contact our [support team](https://www.manageengine.com/products/applications_manager/support.html) or email us at [appmanager-support@manageengine.com](mailto:appmanager-support@manageengine.com)