CVE-2019-18188

Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000151731 - Vendor Advisory () https://success.trendmicro.com/solution/000151731 - Vendor Advisory

Information

Published : 2019-10-28 20:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-18188

Mitre link : CVE-2019-18188

CVE.ORG link : CVE-2019-18188


JSON object : View

Products Affected

trendmicro

  • apex_one

microsoft

  • windows
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')