A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges.
Max CVSS
9.8
EPSS Score
0.22%
Published
2023-06-26
Updated
2023-06-30
A path traversal exists in a specific service dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an unauthenticated remote attacker to delete arbitrary files.
Max CVSS
9.1
EPSS Score
0.20%
Published
2023-06-26
Updated
2023-06-30
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
Max CVSS
9.8
EPSS Score
0.40%
Published
2023-03-10
Updated
2023-03-15
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
Max CVSS
9.1
EPSS Score
0.16%
Published
2023-02-01
Updated
2023-02-07
A forced browsing vulnerability in Trend Micro Apex One could allow an attacker with access to the Apex One console on affected installations to escalate privileges and modify certain agent groupings. Please note: an attacker must first obtain the ability to log onto the Apex One web console in order to exploit this vulnerability.
Max CVSS
9.1
EPSS Score
0.13%
Published
2022-10-10
Updated
2022-10-11
A potential unathenticated file deletion vulnerabilty on Trend Micro Mobile Security for Enterprise 9.8 SP5 could allow an attacker with access to the Management Server to delete files. This issue was resolved in 9.8 SP5 Critical Patch 2.
Max CVSS
9.1
EPSS Score
0.09%
Published
2022-09-19
Updated
2022-09-21
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product’s login authentication by falsifying request parameters on affected installations.
Max CVSS
9.8
EPSS Score
0.18%
Published
2022-09-19
Updated
2022-09-21

CVE-2022-26871

Known exploited
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
Max CVSS
9.8
EPSS Score
16.79%
Published
2022-03-29
Updated
2022-04-08
CISA KEV Added
2022-03-31
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.
Max CVSS
9.3
EPSS Score
0.06%
Published
2022-03-08
Updated
2022-03-18
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.
Max CVSS
9.8
EPSS Score
0.70%
Published
2022-02-24
Updated
2022-03-02
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
Max CVSS
9.8
EPSS Score
0.41%
Published
2022-02-24
Updated
2022-03-03
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
Max CVSS
10.0
EPSS Score
2.06%
Published
2021-09-29
Updated
2022-07-12
Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Exposed Hazardous Function Remote Code Execution vulnerability which could allow an unprivileged client to manipulate the registry and escalate privileges to SYSTEM on affected installations. Authentication is required to exploit this vulnerability.
Max CVSS
9.0
EPSS Score
1.54%
Published
2021-07-08
Updated
2021-07-23
A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
Max CVSS
9.0
EPSS Score
11.53%
Published
2020-11-18
Updated
2020-11-28
A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
Max CVSS
9.0
EPSS Score
11.53%
Published
2020-11-18
Updated
2020-11-28
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
Max CVSS
9.8
EPSS Score
2.66%
Published
2020-11-18
Updated
2020-11-30
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Max CVSS
9.1
EPSS Score
0.13%
Published
2020-09-15
Updated
2020-09-24

CVE-2020-8606

Public exploit
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
Max CVSS
9.8
EPSS Score
97.23%
Published
2020-05-27
Updated
2022-06-02
Trend Micro Worry-Free Business Security (9.0, 9.5, 10.0) is affected by a directory traversal vulnerability that could allow an attacker to manipulate a key file to bypass authentication.
Max CVSS
9.8
EPSS Score
1.22%
Published
2020-03-18
Updated
2020-03-20

CVE-2020-8599

Known exploited
Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.
Max CVSS
10.0
EPSS Score
18.09%
Published
2020-03-18
Updated
2022-07-12
CISA KEV Added
2021-11-03
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.
Max CVSS
10.0
EPSS Score
2.94%
Published
2020-03-18
Updated
2021-07-21
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow an attacker to delete any file on the server with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.
Max CVSS
9.4
EPSS Score
0.23%
Published
2020-03-18
Updated
2021-07-21
A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.
Max CVSS
9.8
EPSS Score
44.72%
Published
2020-12-17
Updated
2021-07-21
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.
Max CVSS
10.0
EPSS Score
0.30%
Published
2020-12-17
Updated
2021-07-21
Trend Micro Mobile Security for Android (Consumer) versions 10.3.1 and below on Android 8.0+ has an issue in which an attacker could bypass the product's App Password Protection feature.
Max CVSS
9.8
EPSS Score
0.31%
Published
2019-12-18
Updated
2019-12-28
78 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!