Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/000290507 | Patch Vendor Advisory |
https://www.tenable.com/security/research/tra-2022-05 | Third Party Advisory |
https://success.trendmicro.com/solution/000290507 | Patch Vendor Advisory |
https://www.tenable.com/security/research/tra-2022-05 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://success.trendmicro.com/solution/000290507 - Patch, Vendor Advisory | |
References | () https://www.tenable.com/security/research/tra-2022-05 - Third Party Advisory |
Information
Published : 2022-02-24 03:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25329
Mitre link : CVE-2022-25329
CVE.ORG link : CVE-2022-25329
JSON object : View
Products Affected
trendmicro
- serverprotect_for_network_appliance_filer
- serverprotect
- serverprotect_for_storage
microsoft
- windows
CWE
CWE-798
Use of Hard-coded Credentials