Home Zohocorp CVE-2024-10203
Back to Zohocorp

CVE-2024-10203

ManageEngine EndPoint Central - Agent

Zohocorp CVSS 7 Updated April 6, 2026

Executive Risk Summary

"The ManageEngine EndPoint Central agent is vulnerable to arbitrary file deletion, allowing an attacker to delete files on the agent-installed machines. This vulnerability affects versions 11.3.2416.21 and below, as well as 11.3.2428.9 and below."

Anticipated Attack Path

  1. 1. Initial Exploitation: Attacker sends malicious request to delete files
  2. 2. Privilege Escalation: Attacker gains access to sensitive files and directories
  3. 3. Persistence: Attacker maintains access to the compromised system

Am I Vulnerable?

  • Verify the version of ManageEngine EndPoint Central installed
  • Check for any suspicious file deletion activity
  • Apply the latest security patch to remediate the vulnerability

Operational Audit Arsenal

Target Type Windows Service
Target Asset ManageEngine Endpoint Central Agent
Standard Path C:\Program Files\ManageEngine\Endpoint Central\bin

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal, but may require restarting the agent service

Internal Work Notes

Urgent: ManageEngine EndPoint Central agent vulnerability - arbitrary file deletion. Apply security patch to prevent data loss and system instability.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.