First published: Thu Aug 27 2020(Updated: )
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Deep Security Manager | ||
trendmicro deep security manager | =10.0 | |
trendmicro deep security manager | =11.0 | |
trendmicro deep security manager | =12.0 | |
Trend Micro Vulnerability Protection | =2.0-sp2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15601 is considered a high severity vulnerability due to its potential for LDAP authentication bypass.
To mitigate CVE-2020-15601, it is recommended to disable LDAP authentication or enable multi-factor authentication.
CVE-2020-15601 affects Trend Micro Deep Security Manager versions 10.x, 11.x, and 12.x.
Yes, CVE-2020-15601 can allow an unauthenticated attacker to bypass manager authentication and gain unauthorized access.
The impact of CVE-2020-15601 includes exposure of sensitive data and potential control over the security management system.