CVE-2021-31520

A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:im_security:1.6:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:im_security:1.6.5:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000286439 - Patch, Vendor Advisory () https://success.trendmicro.com/solution/000286439 - Patch, Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-21-525/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-21-525/ - Third Party Advisory, VDB Entry

Information

Published : 2021-05-10 11:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31520

Mitre link : CVE-2021-31520

CVE.ORG link : CVE-2021-31520


JSON object : View

Products Affected

trendmicro

  • im_security
CWE
CWE-287

Improper Authentication