Vulnerability Details : CVE-2017-11395
Command injection vulnerability in Trend Micro Smart Protection Server (Standalone) 3.1 and 3.2 server administration UI allows attackers with authenticated access to execute arbitrary code on vulnerable installations.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2017-11395
Probability of exploitation activity in the next 30 days: 0.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-11395
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-11395
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11395
-
http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection
Trend Micro Smart Protection OS Command Injection | Core SecurityExploit;Third Party Advisory
-
https://success.trendmicro.com/solution/1117933
Resolve OS Command Injection Vulnerability - Smart Protection Server (Standalone) 3.xMitigation;Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/100461
Trend Micro Smart Protection CVE-2017-11395 OS Command Injection VulnerabilityThird Party Advisory;VDB Entry
Products affected by CVE-2017-11395
- cpe:2.3:a:trendmicro:smart_protection_server:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:smart_protection_server:3.2:*:*:*:*:*:*:*