First published: Thu Aug 27 2020(Updated: )
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Vulnerability Protection | ||
trendmicro deep security manager | =10.0 | |
trendmicro deep security manager | =11.0 | |
trendmicro deep security manager | =12.0 | |
Trend Micro Vulnerability Protection | =2.0-sp2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15605 has a medium severity rating, indicating a considerable risk if exploited.
To fix CVE-2020-15605, it is recommended to apply the latest patches provided by Trend Micro for Vulnerability Protection 2.0 SP2.
CVE-2020-15605 affects users of Trend Micro Vulnerability Protection 2.0 SP2 and certain versions of Deep Security Manager.
Yes, CVE-2020-15605 can be exploited remotely by an unauthenticated attacker with knowledge of the organization's LDAP setup.
The potential impact of CVE-2020-15605 includes unauthorized bypass of manager authentication, leading to unauthorized access to the system.