{"id":6581,"date":"2022-02-01T15:24:01","date_gmt":"2022-02-01T06:24:01","guid":{"rendered":"https:\/\/www.manageengine.jp\/support\/kb\/Desktop_Central\/?p=6581"},"modified":"2022-10-19T05:14:37","modified_gmt":"2022-10-18T20:14:37","slug":"%e3%80%90%e6%97%a2%e7%9f%a5%e3%81%ae%e4%b8%8d%e5%85%b7%e5%90%88%e3%80%91desktop-central%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7cve-2022-23863%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6","status":"publish","type":"post","link":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/?p=6581","title":{"rendered":"\u3010\u6700\u65b0\u30d3\u30eb\u30c9\u3067\u4fee\u6b63\u6e08\u307f\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2022-23863)\u306b\u3064\u3044\u3066"},"content":{"rendered":"<h4>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2022-23863)\u306b\u3064\u3044\u3066<\/h4>\n<h5>\u5bfe\u8c61\u30d3\u30eb\u30c9<\/h5>\n<p><b>Desktop Central 10.1.2137.9\u4ee5\u524d\u306e\u30d3\u30eb\u30c9<\/b><br \/>\n\u203b \u65e5\u672c\u56fd\u5185\u3067\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u3066\u3044\u308bDesktop Central 10.0.644 \u4ee5\u524d\u306e\u30d3\u30eb\u30c9\u3082\u542b\u307e\u308c\u307e\u3059\u3002<br \/>\n\u203b \u65e5\u672c\u56fd\u5185\u3067\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u3066\u3044\u308b Desktop Central 10.1.2119.10 (Desktop Central 10.1.2119.11 \u3078\u306e\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u6642\u3001\u6700\u521d\u306b\u9069\u7528\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u30d1\u30c3\u30af) \u304c\u542b\u307e\u308c\u307e\u3059\u3002\u4e00\u65b9\u3067\u3001Desktop Central 10.1.2119.11 \u306f\u5bfe\u8c61\u5916\u3067\u3059\u3002<br \/>\n\u30d3\u30eb\u30c9\u306e\u6570\u3048\u65b9\u304a\u3088\u3073\u6570\u3048\u65b9\u306e\u5909\u66f4\u306b\u3064\u3044\u3066\u306f<a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Desktop_Central\/?p=31\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u306e\u30ca\u30ec\u30c3\u30b8<\/a>\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<br \/>\n\u203b \u672c\u8106\u5f31\u6027\u306e Desktop Central Cloud \u3078\u306e\u5f71\u97ff\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<hr>\n<h5>\u3010\u554f\u984c\u3011<\/h5>\n<p>\u4e0a\u8a18\u5bfe\u8c61\u30d3\u30eb\u30c9\u306eDesktop Central\u306b\u306f\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3057\u3001Desktop Central \u88fd\u54c1\u5185\u30e6\u30fc\u30b6\u30fc\u304c\u8907\u6570\u3044\u308b\u5834\u5408\u3001\u4e0a\u4f4d\u306e\u5f79\u5272\u306e\u30e6\u30fc\u30b6\u30fc\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u5909\u66f4\u53ef\u80fd\u306a\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059(CVE-2022-23863)\u3002<\/p>\n<div class=\"point\">\n\u3053\u306e\u8106\u5f31\u6027\u306b\u3088\u3063\u3066 Desktop Central \u88fd\u54c1\u5185\u30e6\u30fc\u30b6\u30fc<b>\u4ee5\u5916<\/b>\u304b\u3089\u306e\u6a29\u9650\u6607\u683c\u3092\u53d7\u3051\u308b\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002\n<\/div>\n<ul>\n<li><a href=\"https:\/\/pitstop.manageengine.com\/portal\/en\/community\/topic\/security-update-fix-available-for-a-privilege-escalation-vulnerability\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/pitstop.manageengine.com\/portal\/en\/community\/topic\/security-update-fix-available-for-a-privilege-escalation-vulnerability<\/a>(Zoho Corporation, \u82f1\u8a9e)<\/li>\n<li><a href=\"https:\/\/www.manageengine.com\/products\/desktop-central\/privilege-escalation-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.manageengine.com\/products\/desktop-central\/privilege-escalation-vulnerability.html<\/a>(Zoho Corporation, \u82f1\u8a9e)<\/li>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-23863\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-23863<\/a>(CVE)<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-23863\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-23863<\/a>(NIST)<\/li>\n<\/ul>\n<hr>\n<h5>\u3010\u5f71\u97ff\u7bc4\u56f2\u3011<\/h5>\n<p>Desktop Central \u88fd\u54c1\u5185\u30e6\u30fc\u30b6\u30fc\u304c\u8907\u6570\u5b58\u5728\u3057\u3001\u30ed\u30fc\u30ab\u30eb\u8a8d\u8a3c\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u5834\u5408\u306b\u306e\u307f\u672c\u8106\u5f31\u6027\u306e\u5f71\u97ff\u304c\u3042\u308a\u307e\u3059\u3002<br \/>\n\u4e0a\u8a18\u5bfe\u8c61\u30d3\u30eb\u30c9\u306eDesktop Central\u306b\u306f\u3001\u6a29\u9650\u6607\u683c\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3057\u3001Administrator \u4ee5\u5916\u306e\u5f79\u5272\u306e Desktop Central \u88fd\u54c1\u5185\u30e6\u30fc\u30b6\u30fc\uff08Auditor, Guest, Patch Manager\u306a\u3069\uff09\u304c\u3088\u308a\u4e0a\u4f4d\u306e\u5f79\u5272\u306e\u30e6\u30fc\u30b6\u30fc\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u5909\u66f4\u53ef\u80fd\u306a\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<br \/>\n\u3053\u306e\u8106\u5f31\u6027\u306b\u3088\u3063\u3066 Desktop Central \u88fd\u54c1\u5185\u30e6\u30fc\u30b6\u30fc<b>\u4ee5\u5916<\/b>\u304b\u3089\u306e\u6a29\u9650\u6607\u683c\u3092\u53d7\u3051\u308b\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<hr>\n<h5>\u3010\u5bfe\u51e6\u65b9\u6cd5\u3011<\/h5>\n<p>\u65e5\u672c\u56fd\u5185\u5411\u3051\u6700\u65b0\u30d3\u30eb\u30c9\u3067\u4fee\u6b63\u6e08\u307f\u3067\u3059\u3002Desktop Central 10.1.2137.11 \u4ee5\u964d\u306e\u30d3\u30eb\u30c9\u306b\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u3057\u307e\u3059\u3002<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2022-23863)\u306b\u3064\u3044\u3066 \u5bfe\u8c61\u30d3\u30eb\u30c9 Desktop Central 10.1.\u2026 <a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/?p=6581\" class=\"more\">\uff3b\u7d9a\u304d\u3092\u8aad\u3080\uff3d<\/a><\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[436,8],"tags":[1066,1067,466],"class_list":["post-6581","post","type-post","status-publish","format-standard","hentry","category-08security","category-05settings_operation","tag-cve-2022-23863","tag-1067","tag-466"],"modified_by":"seiji","_links":{"self":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/6581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6581"}],"version-history":[{"count":9,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/6581\/revisions"}],"predecessor-version":[{"id":7717,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/6581\/revisions\/7717"}],"wp:attachment":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}