CVE-2025-1724
Published: 17 March 2025
Summary
CVE-2025-1724 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Manageengine (inferred from references). Its CVSS base score is 7.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Domain Accounts (T1078.002); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the hardcoded sensitive token vulnerability by requiring timely identification, reporting, and patching to version 6130 or later.
Prohibits and manages authenticators such as hardcoded tokens to prevent their use in AD authentication, directly addressing CWE-798.
Enforces account management practices like disabling unused AD-only accounts or restricting their privileges to mitigate takeover impacts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded token enables remote AD account takeover (T1078.002 Domain Accounts) via network-accessible on-premise analytics application (T1190 Exploit Public-Facing Application).
NVD Description
Zohocorp's ManageEngine Analytics Plus and Zoho Analytics on-premise versions older than 6130 are vulnerable to an AD only account takeover because of a hardcoded sensitive token.
Deeper analysisAI
Zohocorp's ManageEngine Analytics Plus and Zoho Analytics on-premise versions older than 6130 are vulnerable to CVE-2025-1724, an account takeover issue stemming from a hardcoded sensitive token, classified under CWE-798 (Use of Hard-coded Credentials). Published on 2025-03-17, this flaw carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high confidentiality and integrity impacts without affecting availability.
The vulnerability enables an attacker with network access to perform an Active Directory (AD)-only account takeover, requiring no privileges or user interaction but involving high attack complexity. Successful exploitation grants the attacker high-level access to the compromised AD account, potentially allowing unauthorized data access and modifications within the affected analytics platforms.
Official advisories from ManageEngine and Zoho detail mitigation steps, available at https://www.manageengine.com/analytics-plus/CVE-2025-1724.html and https://www.zoho.com/analytics/onpremise/CVE-2025-1724.html. Organizations should upgrade to version 6130 or later to address the hardcoded token issue.
Details
- CWE(s)