Vulnerability Details : CVE-2020-8599
Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.
Products affected by CVE-2020-8599
- cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
CVE-2020-8599 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Trend Micro Apex One and OfficeScan Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Trend Micro Apex One and OfficeScan server contain a vulnerable EXE file that could allow a remote attacker to write data to a path on affected installations and bypass root login.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-8599
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2020-8599
15.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8599
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2020-8599
-
https://success.trendmicro.com/solution/000245571
Patch;Vendor Advisory
-
https://success.trendmicro.com/jp/solution/000244253
Q&A | Trend Micro Business SupportPatch;Vendor Advisory
Jump to