Vulnerability Details : CVE-2020-15605
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability.
Vulnerability category: BypassGain privilege
Products affected by CVE-2020-15605
- cpe:2.3:a:trendmicro:deep_security_manager:11.0:-:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:deep_security_manager:10.0:-:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:deep_security_manager:12.0:-:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:vulnerability_protection:2.0:sp2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15605
3.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15605
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2020-15605
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-15605
-
https://www.zerodayinitiative.com/advisories/ZDI-20-1083/
ZDI-20-1083 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://success.trendmicro.com/solution/000252039
Patch;Vendor Advisory
Jump to