Company Details
manageengine
528
50,793
5112
manageengine.com
0
MAN_1795539
In-progress

ManageEngine Company CyberSecurity Posture
manageengine.comManageEngine crafts the industry's broadest suite of IT management software. We have everything you need—more than 60+ enterprise products and 60+ free tools—to manage all of your IT operations, from networks and servers to applications, service desk, Active Directory, security, desktops, and mobile devices. Since 2002, IT teams like yours have turned to us for affordable, feature-rich software that's easy to use. You can find our on-premises and cloud solutions powering the IT of over 280,000 companies around the world, including nine of every ten Fortune 100 companies. As you prepare for the IT management challenges ahead, we'll lead the way with new solutions, contextual integrations, and other advances that can only come from a company singularly dedicated to its customers. And as a division of Zoho Corporation, we'll continue pushing for the tight business-IT alignment you'll need to seize opportunities in the future. About us: https://www.manageengine.com/company.html Our offices are located in the US, India, Singapore, Japan, China, The Netherlands, Australia, Mexico, UAE, Saudi Arabia and South Africa. For more information, follow the company blog at http://blogs.manageengine.com/, our Pitstop Community at http://pitstop.manageengine.com/, Facebook at http://www.facebook.com/ManageEngine, and on Twitter @ManageEngine. Try any of our tools for free: https://www.manageengine.com/free-tools.html.
Company Details
manageengine
528
50,793
5112
manageengine.com
0
MAN_1795539
In-progress
Between 600 and 649

ManageEngine Global Score (TPRM)XXXX

Description: A sophisticated SEO poisoning campaign exploited Bing search results to distribute Bumblebee malware, leading to Akira ransomware attacks. Users searching for ManageEngine OpManager were redirected to a malicious site hosting a trojanized installer. The malware established command and control communications, escalated privileges, and exfiltrated domain account hashes. The attack culminated in ransomware deployment, encrypting systems within 44 hours and compromising child domains, causing significant operational disruption and data loss.
Description: A high-severity authentication vulnerability, identified as CVE-2025-1724, affected ManageEngine Analytics Plus on-premise versions before the 6130 build. Malicious actors could exploit the flaw to bypass AD authentication, gaining unauthorized access to user accounts and sensitive data. The issue was patched on March 11, 2025. Key management and encryption weaknesses allowed token capture and replay, leading to potential account takeovers and exposing organizations to data exfiltration, regulatory non-compliance, and escalation of privileges.
Description: A severe security vulnerability identified as CVE-2025-3835 has been found in ManageEngine Exchange Reporter Plus. This vulnerability allows attackers to execute arbitrary commands on target servers through a flaw in the Content Search module. The vulnerability affects all installations with build 5721 and below. Security experts advise immediate updates to prevent complete system compromise, potential data breaches, and further malicious activities such as ransomware deployment.


ManageEngine has 597.67% more incidents than the average of same-industry companies with at least one recorded incident.
ManageEngine has 368.75% more incidents than the average of all companies with at least one recorded incident.
ManageEngine reported 3 incidents this year: 0 cyber attacks, 1 ransomware, 2 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
ManageEngine cyber incidents detection timeline including parent company and subsidiaries

ManageEngine crafts the industry's broadest suite of IT management software. We have everything you need—more than 60+ enterprise products and 60+ free tools—to manage all of your IT operations, from networks and servers to applications, service desk, Active Directory, security, desktops, and mobile devices. Since 2002, IT teams like yours have turned to us for affordable, feature-rich software that's easy to use. You can find our on-premises and cloud solutions powering the IT of over 280,000 companies around the world, including nine of every ten Fortune 100 companies. As you prepare for the IT management challenges ahead, we'll lead the way with new solutions, contextual integrations, and other advances that can only come from a company singularly dedicated to its customers. And as a division of Zoho Corporation, we'll continue pushing for the tight business-IT alignment you'll need to seize opportunities in the future. About us: https://www.manageengine.com/company.html Our offices are located in the US, India, Singapore, Japan, China, The Netherlands, Australia, Mexico, UAE, Saudi Arabia and South Africa. For more information, follow the company blog at http://blogs.manageengine.com/, our Pitstop Community at http://pitstop.manageengine.com/, Facebook at http://www.facebook.com/ManageEngine, and on Twitter @ManageEngine. Try any of our tools for free: https://www.manageengine.com/free-tools.html.


With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever
As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m
Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and

Zoho offers beautifully smart software to help you grow your business. With over 100 million users worldwide, Zoho's 55+ products aid your sales and marketing, support and collaboration, finance, and recruitment needs—letting you focus only on your business. Zoho respects user privacy and does not h
We help those who build the future to make it amazing. In an era where new technologies are born every minute, and the demand for meaningful digital experiences has never been so intense, we unlock our customers’ innovative potential, empowering them to transform their boldest ideas into reality, an
The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobi

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we
.png)
By Beatriz Marie D. Cruz, Reporter. PHILIPPINE companies must strengthen their cybersecurity measures as rapid digitalization and the...
ManageEngine, the IT management division of Zoho Corporation, is expanding its footprint in the Philippines as digitalization across finance...
ManageEngine, the IT management division of Zoho Corporation, is expanding its footprint in the Philippines as digitalization across finance...
On the sidelines of Cairo ICT 2025, Sada Elbalad English (SEE) sat down with Prasanna Venkatesh Srinivasan, Associate Director at...
ManageEngine to Showcase Enhancements to their AI-Driven IT Management and Cybersecurity Solutions at Cairo ICT 2025.
Cairo, Egypt — 16th November 2025: ManageEngine, a division of Zoho Corporation and a leading provider of enterprise IT management solutions...
The Event Will Spotlight AI-Powered Identity Management and Reengineered Threat Detection for Digital Resilience.
Sujatha S. Iyer, Head of AI Security at ManageEngine, explains how collaboration between humans and AI transforms defense.
ManageEngine expands its IT solutions in Latin America with Generative AI in ServiceDesk Plus and MSP Central, aiming to optimize...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ManageEngine is https://www.manageengine.com.
According to Rankiteo, ManageEngine’s AI-generated cybersecurity score is 647, reflecting their Poor security posture.
According to Rankiteo, ManageEngine currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ManageEngine is not certified under SOC 2 Type 1.
According to Rankiteo, ManageEngine does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ManageEngine is not listed as GDPR compliant.
According to Rankiteo, ManageEngine does not currently maintain PCI DSS compliance.
According to Rankiteo, ManageEngine is not compliant with HIPAA regulations.
According to Rankiteo,ManageEngine is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ManageEngine operates primarily in the Software Development industry.
ManageEngine employs approximately 528 people worldwide.
ManageEngine presently has no subsidiaries across any sectors.
ManageEngine’s official LinkedIn profile has approximately 50,793 followers.
ManageEngine is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, ManageEngine does not have a profile on Crunchbase.
Yes, ManageEngine maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/manageengine.
As of December 04, 2025, Rankiteo reports that ManageEngine has experienced 3 cybersecurity incidents.
ManageEngine has an estimated 27,196 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with patch released, and containment measures with restricting network access to exchange reporter plus instances, containment measures with implementing additional network segmentation, containment measures with enhancing monitoring for suspicious activities targeting the vulnerable component, and remediation measures with apply the patch to existing installations following the documented procedure, remediation measures with verify successful update by confirming the build number has changed to 5722 or higher, and network segmentation with implementing additional network segmentation, and enhanced monitoring with enhancing monitoring for suspicious activities targeting the vulnerable component..
Title: Authentication Vulnerability in ManageEngine Analytics Plus
Description: A high-severity authentication vulnerability, identified as CVE-2025-1724, affected ManageEngine Analytics Plus on-premise versions before the 6130 build. Malicious actors could exploit the flaw to bypass AD authentication, gaining unauthorized access to user accounts and sensitive data. The issue was patched on March 11, 2025. Key management and encryption weaknesses allowed token capture and replay, leading to potential account takeovers and exposing organizations to data exfiltration, regulatory non-compliance, and escalation of privileges.
Date Resolved: March 11, 2025
Type: Authentication Vulnerability
Attack Vector: Bypass AD authentication
Vulnerability Exploited: CVE-2025-1724
Motivation: Unauthorized access to user accounts and sensitive data
Title: ManageEngine Exchange Reporter Plus RCE Flaw
Description: A severe security vulnerability has been identified in ManageEngine Exchange Reporter Plus that could allow attackers to execute arbitrary commands on target servers.
Type: Remote Code Execution (RCE)
Attack Vector: Exploiting input validation flaw in the Content Search module
Vulnerability Exploited: CVE-2025-3835
Motivation: Complete system compromisePotential data breachesEstablish persistent accessMove laterally within networksExfiltrate sensitive dataDeploy additional malicious payloads such as ransomware
Title: SEO Poisoning Campaign Distributing Bumblebee Malware Leading to Akira Ransomware Attacks
Description: A sophisticated search engine optimization (SEO) poisoning campaign that exploited Bing search results to distribute Bumblebee malware, ultimately leading to devastating Akira ransomware attacks. The campaign targeted users searching for legitimate IT management software, redirecting them to a malicious domain hosting a trojanized MSI installer.
Date Detected: July 2025
Type: Malware, Ransomware
Attack Vector: SEO Poisoning, Trojanized Software Installer
Motivation: Financial gain, Data exfiltration
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Bypass AD authentication, Content Search module, Bing search results and Trojanized MSI installer.

Data Compromised: User accounts, Sensitive data

Systems Affected: All Exchange Reporter Plus installations with build 5721 and below

Data Compromised: Password hashes, Domain account information
Systems Affected: Enterprise networks, Domain controllers
Operational Impact: Domain-wide administrative privileges obtained, Ransomware encryption
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are User Accounts, Sensitive Data, , Password hashes and Domain account information.

Entity Name: ManageEngine
Entity Type: Software Company
Industry: IT Management

Entity Name: ManageEngine
Entity Type: Software Vendor
Industry: Technology
Customers Affected: All organizations using the affected software

Entity Name: ManageEngine
Entity Type: Software Vendor
Industry: IT Management

Remediation Measures: Patch released

Containment Measures: Restricting network access to Exchange Reporter Plus instancesImplementing additional network segmentationEnhancing monitoring for suspicious activities targeting the vulnerable component
Remediation Measures: Apply the patch to existing installations following the documented procedureVerify successful update by confirming the build number has changed to 5722 or higher
Network Segmentation: ['Implementing additional network segmentation']
Enhanced Monitoring: Enhancing monitoring for suspicious activities targeting the vulnerable component

Type of Data Compromised: User accounts, Sensitive data
Data Exfiltration: Potential data exfiltration
Data Encryption: Key management and encryption weaknesses

Type of Data Compromised: Password hashes, Domain account information
Sensitivity of Data: High
Data Exfiltration: Yes
Data Encryption: Yes
File Types Exposed: NTDS.dit, SYSTEM, SECURITY
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch released, Apply the patch to existing installations following the documented procedure, Verify successful update by confirming the build number has changed to 5722 or higher, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by restricting network access to exchange reporter plus instances, implementing additional network segmentation, enhancing monitoring for suspicious activities targeting the vulnerable component and .

Ransomware Strain: Akira
Data Encryption: Yes
Data Exfiltration: Yes

Recommendations: Update immediately to build 5722 or higher, Restrict network access to Exchange Reporter Plus instances, Implement additional network segmentation, Enhance monitoring for suspicious activities targeting the vulnerable componentUpdate immediately to build 5722 or higher, Restrict network access to Exchange Reporter Plus instances, Implement additional network segmentation, Enhance monitoring for suspicious activities targeting the vulnerable componentUpdate immediately to build 5722 or higher, Restrict network access to Exchange Reporter Plus instances, Implement additional network segmentation, Enhance monitoring for suspicious activities targeting the vulnerable componentUpdate immediately to build 5722 or higher, Restrict network access to Exchange Reporter Plus instances, Implement additional network segmentation, Enhance monitoring for suspicious activities targeting the vulnerable component

Source: The DFIR Report
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The DFIR Report.

Entry Point: Bypass AD authentication

Entry Point: Content Search module
High Value Targets: Financial Institutions, Government Agencies, Large Enterprises,
Data Sold on Dark Web: Financial Institutions, Government Agencies, Large Enterprises,

Entry Point: Bing search results, Trojanized MSI installer
Reconnaissance Period: Approximately five hours
Backdoors Established: Yes
High Value Targets: Domain controllers, Enterprise networks
Data Sold on Dark Web: Domain controllers, Enterprise networks

Root Causes: Authentication Vulnerability, Key Management And Encryption Weaknesses,
Corrective Actions: Patch released

Root Causes: Input validation flaw in the Content Search module
Corrective Actions: Implement Proper Input Validation And Sanitization In The Content Search Module,

Root Causes: SEO poisoning, Trojanized software, Lack of detection for malicious DLL deployment
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Enhancing Monitoring For Suspicious Activities Targeting The Vulnerable Component, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch released, Implement Proper Input Validation And Sanitization In The Content Search Module, .
Most Recent Incident Detected: The most recent incident detected was on July 2025.
Most Recent Incident Resolved: The most recent incident resolved was on March 11, 2025.
Most Significant Data Compromised: The most significant data compromised in an incident were user accounts, sensitive data, , Password hashes and Domain account information.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Restricting network access to Exchange Reporter Plus instancesImplementing additional network segmentationEnhancing monitoring for suspicious activities targeting the vulnerable component.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were sensitive data, user accounts, Password hashes and Domain account information.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement additional network segmentation, Enhance monitoring for suspicious activities targeting the vulnerable component, Restrict network access to Exchange Reporter Plus instances and Update immediately to build 5722 or higher.
Most Recent Source: The most recent source of information about an incident is The DFIR Report.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Bypass AD authentication, Bing search results, Trojanized MSI installer and Content Search module.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Approximately five hours.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Authentication vulnerabilityKey management and encryption weaknesses, Input validation flaw in the Content Search module, SEO poisoning, Trojanized software, Lack of detection for malicious DLL deployment.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patch released, Implement proper input validation and sanitization in the Content Search module.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.