First published: Mon Jan 30 2017(Updated: )
SnmpUtils in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) spare_Community, (2) spare_AllowGroupIP, or (3) spare_AllowGroupNetmask parameter to admin_notification.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Smart Protection Server | =2.5 | |
Trend Micro Smart Protection Server | =2.6 | |
Trend Micro Smart Protection Server | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6267 is classified with a medium severity level due to its potential for remote command execution.
To mitigate CVE-2016-6267, upgrade Trend Micro Smart Protection Server to build 2200 or later for version 2.5, build 2106 or later for version 2.6, or build 1330 or later for version 3.0.
CVE-2016-6267 affects users of Trend Micro Smart Protection Server versions 2.5, 2.6, and 3.0 prior to their respective patched builds.
CVE-2016-6267 can be exploited by authenticated remote users to execute arbitrary commands through crafted input.
While the recommended approach is to update to a patched version, restricting access to the affected parameters can serve as a temporary workaround for CVE-2016-6267.