First published: Thu Mar 15 2018(Updated: )
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Email Encryption Gateway | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6220 is classified as a high severity vulnerability due to its potential for arbitrary file write and code execution.
To mitigate CVE-2018-6220, upgrade Trend Micro Email Encryption Gateway to the latest patched version.
CVE-2018-6220 specifically affects Trend Micro Email Encryption Gateway version 5.5.
An attacker exploiting CVE-2018-6220 could inject arbitrary data, potentially gaining code execution on the compromised system.
Currently, the recommended approach for CVE-2018-6220 is to apply security updates rather than rely on workarounds.