First published: Mon Nov 09 2020(Updated: )
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Interscan Messaging Security Virtual Appliance | <=9.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27016 is a vulnerability in Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 that allows an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page.
CVE-2020-27016 has a severity score of 8.8 out of 10 (high).
CVE-2020-27016 affects Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 by allowing an attacker to modify policy rules through a cross-site request forgery (CSRF) vulnerability.
An attacker can exploit CVE-2020-27016 by tricking an authenticated administrator into accessing an attacker-controlled web page.
Yes, you can find more information about CVE-2020-27016 in the following references: [Reference 1](https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/), [Reference 2](https://success.trendmicro.com/solution/000279833).