First published: Wed Apr 12 2017(Updated: )
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Threat Discovery Appliance | =2.6.1062-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7552 has a high severity due to its potential for remote file deletion and ability to bypass authentication.
To fix CVE-2016-7552, update the Trend Micro Threat Discovery Appliance to a patched version that addresses the directory traversal vulnerability.
CVE-2016-7552 can facilitate remote attacks that delete arbitrary files and potentially lead to denial of service.
CVE-2016-7552 affects the Trend Micro Threat Discovery Appliance version 2.6.1062-r1.
No, CVE-2016-7552 can be exploited by unauthenticated attackers.