Home Zohocorp CVE-2024-5467
Back to Zohocorp

CVE-2024-5467

ManageEngine - ADAudit Plus

Zohocorp CVSS 8.3 Updated April 6, 2026

Executive Risk Summary

"An authenticated SQL injection vulnerability exists in ManageEngine ADAudit Plus versions below 8121, specifically in the account lockout report. This vulnerability could allow an attacker to execute malicious SQL code, potentially leading to unauthorized data access or modification."

Anticipated Attack Path

  1. 1. Initial Access: An attacker gains access to the ManageEngine ADAudit Plus system with valid credentials.
  2. 2. Exploitation: The attacker injects malicious SQL code into the account lockout report.
  3. 3. Post-Exploitation: The attacker potentially extracts or modifies sensitive data within the Active Directory audit database.

Am I Vulnerable?

  • Verify the version of ManageEngine ADAudit Plus to ensure it is 8121 or later.
  • Review account lockout report configurations for any suspicious activity.
  • Apply the patch provided by Zohocorp to remediate the vulnerability.

Operational Audit Arsenal

Target Type Windows Service
Target Asset ADAuditPlus.exe
Standard Path C:\Program Files\ManageEngine\ADAudit Plus\bin

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal, as the patch primarily affects the ADAudit Plus service.

Internal Work Notes

CVE-2024-5467: ManageEngine ADAudit Plus authenticated SQL injection vulnerability. Apply patch to version 8121 or later to prevent potential data compromise.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.