CVE-2018-3609

A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 04:05

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103097 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103097 - Third Party Advisory, VDB Entry
References () https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt - Exploit, Third Party Advisory () https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt - Exploit, Third Party Advisory
References () https://success.trendmicro.com/jp/solution/1119290 - Vendor Advisory () https://success.trendmicro.com/jp/solution/1119290 - Vendor Advisory
References () https://success.trendmicro.com/solution/1119277 - Vendor Advisory () https://success.trendmicro.com/solution/1119277 - Vendor Advisory

Information

Published : 2018-02-16 22:29

Updated : 2024-11-21 04:05


NVD link : CVE-2018-3609

Mitre link : CVE-2018-3609

CVE.ORG link : CVE-2018-3609


JSON object : View

Products Affected

trendmicro

  • interscan_messaging_security_virtual_appliance
CWE
CWE-522

Insufficiently Protected Credentials

CWE-532

Insertion of Sensitive Information into Log File