CVE-2022-25329

Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*
cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filer:5.8:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:52

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000290507 - Patch, Vendor Advisory () https://success.trendmicro.com/solution/000290507 - Patch, Vendor Advisory
References () https://www.tenable.com/security/research/tra-2022-05 - Third Party Advisory () https://www.tenable.com/security/research/tra-2022-05 - Third Party Advisory

Information

Published : 2022-02-24 03:15

Updated : 2024-11-21 06:52


NVD link : CVE-2022-25329

Mitre link : CVE-2022-25329

CVE.ORG link : CVE-2022-25329


JSON object : View

Products Affected

trendmicro

  • serverprotect_for_network_appliance_filer
  • serverprotect
  • serverprotect_for_storage

microsoft

  • windows
CWE
CWE-798

Use of Hard-coded Credentials