First published: Wed May 23 2018(Updated: )
A vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a remote attacker to execute arbitrary SQL statements on vulnerable installations due to a flaw in the formRegistration2 class. Authentication is required to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Email Encryption Gateway | <=5.5 | |
Trend Micro Encryption for Email |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10351 is considered to have a high severity due to its potential for remote code execution.
To mitigate CVE-2018-10351, update the Trend Micro Email Encryption Gateway to the latest version that addresses this vulnerability.
CVE-2018-10351 affects Trend Micro Email Encryption Gateway version 5.5 and earlier installations.
CVE-2018-10351 can be exploited through a remote attack allowing the execution of arbitrary SQL statements.
Yes, authentication is required to exploit CVE-2018-10351.