First published: Wed May 23 2018(Updated: )
A directory traversal vulnerability in Trend Micro Endpoint Application Control 2.0 could allow a remote attacker to execute arbitrary code on vulnerable installations due to a flaw in the FileDrop servlet. Authentication is required to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Endpoint Application Control | ||
Trendmicro Endpoint Application Control | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10357 is considered a medium severity vulnerability due to the potential for remote code execution.
To fix CVE-2018-10357, apply the latest security updates released by Trend Micro for Endpoint Application Control 2.0.
CVE-2018-10357 affects Trend Micro Endpoint Application Control version 2.0.
Yes, authentication is required to exploit CVE-2018-10357.
CVE-2018-10357 is a directory traversal vulnerability that may allow arbitrary code execution.