Home Zohocorp CVE-2025-3836
Back to Zohocorp

CVE-2025-3836

ManageEngine ADAudit Plus - Logon Events Aggregate Report

Zohocorp CVSS 8.3 Updated April 6, 2026

Executive Risk Summary

"ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the logon events aggregate report, allowing an attacker to potentially extract or modify sensitive data. This vulnerability requires authentication, limiting the attack vector but still posing a significant risk to the integrity of the system."

Anticipated Attack Path

  1. 1. Initial Access: Attacker gains authenticated access to ManageEngine ADAudit Plus
  2. 2. Privilege Escalation: Attacker exploits SQL injection vulnerability to elevate privileges
  3. 3. Data Extraction/Modification: Attacker extracts or modifies sensitive data

Am I Vulnerable?

  • Verify ManageEngine ADAudit Plus version is 8510 or prior
  • Check for any suspicious logon events or database modifications
  • Review user access and authentication logs for potential indicators of compromise

Operational Audit Arsenal

Target Type Windows Service
Target Asset ADAuditPlus.exe
Standard Path C:\Program Files\ManageEngine\ADAudit Plus\bin

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal to Moderate, depending on the system's usage and configuration

Internal Work Notes

CVE-2025-3836: ManageEngine ADAudit Plus SQL Injection Vulnerability - Apply patch to prevent authenticated SQL injection attacks

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.