First published: Fri Feb 16 2018(Updated: )
A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Interscan Messaging Security Virtual Appliance | =9.0 | |
Trendmicro Interscan Messaging Security Virtual Appliance | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-3609 is high, with a CVSS score of 8.1.
An unauthenticated user can exploit CVE-2018-3609 by accessing a sensitive log file that could be used to bypass authentication.
Versions 9.0 and 9.1 of Trend Micro InterScan Messaging Security Virtual Appliance are affected by CVE-2018-3609.
Currently, there is no known workaround for CVE-2018-3609.
You can find more information about CVE-2018-3609 at the following references: [http://www.securityfocus.com/bid/103097](http://www.securityfocus.com/bid/103097), [https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt](https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt), [https://success.trendmicro.com/jp/solution/1119290](https://success.trendmicro.com/jp/solution/1119290).