Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/000151731 | Vendor Advisory |
https://success.trendmicro.com/solution/000151731 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://success.trendmicro.com/solution/000151731 - Vendor Advisory |
Information
Published : 2019-10-28 20:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-18188
Mitre link : CVE-2019-18188
CVE.ORG link : CVE-2019-18188
JSON object : View
Products Affected
trendmicro
- apex_one
microsoft
- windows
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')