First published: Sun Aug 23 2015(Updated: )
Trend Micro Deep Discovery Inspector (DDI) on Deep Discovery Threat appliances with software before 3.5.1477, 3.6.x before 3.6.1217, 3.7.x before 3.7.1248, 3.8.x before 3.8.1263, and other versions allows remote attackers to obtain sensitive information or change the configuration via a direct request to the (1) system log URL, (2) whitelist URL, or (3) blacklist URL.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Deep Discovery Inspector | =3.5 | |
Trend Micro Deep Discovery Inspector | =3.5 | |
Trend Micro Deep Discovery Inspector | =3.5 | |
Trend Micro Deep Discovery Inspector | =3.6 | |
Trend Micro Deep Discovery Inspector | =3.7 | |
Trend Micro Deep Discovery Inspector | =3.7 | |
Trend Micro Deep Discovery Inspector | =3.7 | |
Trend Micro Deep Discovery Inspector | =3.8 | |
Trend Micro Deep Discovery Inspector | =3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2873 has a medium severity rating, indicating a moderate impact on security.
To fix CVE-2015-2873, upgrade to the latest version of Trend Micro Deep Discovery Inspector as specified in the vulnerability announcements.
CVE-2015-2873 affects Trend Micro Deep Discovery Inspector versions prior to 3.5.1477, 3.6.x before 3.6.1217, 3.7.x before 3.7.1248, and 3.8.x before 3.8.1263.
CVE-2015-2873 allows remote attackers to obtain sensitive information or change configurations via direct requests.
There are no official workarounds for CVE-2015-2873, and upgrading to a patched version is the recommended action.