Cyber Posture

CVE-2026-3324

High

Published: 16 April 2026

Published
16 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0017 38.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass on certain actions due to improper filter configuration.

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for access to system resources, directly preventing authentication bypass due to improper filter configuration in Log360.

prevent

AC-14 identifies and limits specific actions permitted without identification or authentication, mitigating unauthorized access on vulnerable actions in Log360.

prevent

CM-6 mandates secure configuration settings for components like filters, addressing the improper filter configuration causing the authentication bypass.

Security SummaryAI

CVE-2026-3324 is an authentication bypass vulnerability in Zohocorp ManageEngine Log360 versions 13000 through 13013, stemming from improper filter configuration and mapped to CWE-288. Published on 2026-04-16, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to its network accessibility and lack of prerequisites for exploitation.

Unauthenticated attackers with network access to a vulnerable Log360 instance can exploit this issue with low complexity and no user interaction required. Successful exploitation enables bypass of authentication on certain actions, resulting in high confidentiality impact—such as unauthorized access to sensitive log data—and low integrity impact, with no disruption to availability.

Mitigation details are available in the vendor advisory at https://www.manageengine.com/log-management/advisory/CVE-2026-3324.html.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1654 Log Enumeration Discovery
Adversaries may enumerate system and service logs to find useful data.
Why these techniques?

CVE-2026-3324 enables exploitation of a public-facing log management application (T1190) via authentication bypass, directly facilitating unauthorized access to sensitive logs (T1654).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References