First published: Mon Sep 28 2020(Updated: )
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex One | =2019 | |
Trend Micro Apex One | =saas | |
Microsoft Windows | ||
Trend Micro OfficeScan XG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25773 is rated as a high-severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2020-25773, ensure that no corrupted configuration files are imported into the Trend Micro Apex One ServerMigrationTool.
CVE-2020-25773 affects Trend Micro Apex One 2019 and its SaaS versions, as well as Trend Micro OfficeScan XG.
CVE-2020-25773 can be exploited through a social engineering attack where a user inadvertently imports a malicious configuration file.
Yes, user interaction is required for CVE-2020-25773 as the target must import a corrupted configuration file.