First published: Thu Mar 15 2018(Updated: )
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Email Encryption Gateway | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6229 has been rated as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2018-6229, update the Trend Micro Email Encryption Gateway to the latest patched version.
The impact of CVE-2018-6229 includes the risk of unauthorized SQL commands being executed, potentially allowing an attacker to take over the system.
CVE-2018-6229 affects version 5.5 of the Trend Micro Email Encryption Gateway.
Yes, CVE-2018-6229 can be exploited remotely if an attacker has access to the vulnerable edit policy script.