First published: Thu Aug 03 2017(Updated: )
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the tr parameter within Proxy.php. Formerly ZDI-CAN-4543.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro OfficeScan Corporate Edition | =11.0-sp1 | |
Trend Micro OfficeScan Corporate Edition | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11393 has been assigned a high severity rating due to its ability to allow remote code execution.
To fix CVE-2017-11393, it is recommended to apply the latest security patches provided by Trend Micro for OfficeScan.
CVE-2017-11393 affects Trend Micro OfficeScan version 11.0 SP1 and version 12.0.
There have been reports that CVE-2017-11393 is being actively exploited in the wild.
Exploitation of CVE-2017-11393 could lead to unauthorized access and execution of arbitrary code on vulnerable installations.