First published: Fri Nov 07 2014(Updated: )
The AdminUI in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) before 6.0 HF build 1244 allows remote authenticated users to read arbitrary files via vectors related to configuration input when saving filters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Web Security Virtual Appliance | =5.1 | |
Trend Micro InterScan Web Security Virtual Appliance | =5.5 | |
Trend Micro InterScan Web Security Virtual Appliance | =5.6 | |
Trend Micro InterScan Web Security Virtual Appliance | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8510 has a medium severity rating, allowing remote authenticated users to access arbitrary files.
To remediate CVE-2014-8510, upgrade the Trend Micro InterScan Web Security Virtual Appliance to version 6.0 HF build 1244 or later.
CVE-2014-8510 affects users of Trend Micro InterScan Web Security Virtual Appliance versions 5.1, 5.5, 5.6, and 6.0 prior to HF build 1244.
The impact of CVE-2014-8510 allows a remote authenticated user to read sensitive configuration files, potentially leading to data exposure.
There are no official workarounds for CVE-2014-8510; upgrading to a patched version is recommended for security.