First published: Wed Mar 18 2020(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Worry-Free Business Security. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the TempFileName parameter provided to the cgiRecvFile.exe endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to bypass authentication on the system.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Worry-free Business Security | =9.0-sp3 | |
Trendmicro Worry-free Business Security | =9.5 | |
Trendmicro Worry-free Business Security | =10.0 | |
Trendmicro Worry-free Business Security | =10.0-sp1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8600 is a vulnerability in Trend Micro Worry-Free Business Security that allows remote attackers to bypass authentication.
CVE-2020-8600 is classified as critical with a severity value of 9.8.
CVE-2020-8600 affects Trend Micro Worry-Free Business Security versions 9.0 SP3, 9.5, 10.0, and 10.0 SP1.
Exploiting CVE-2020-8600 does not require authentication and involves manipulating the TempFileName parameter in the cgiRecvF function.
To fix CVE-2020-8600, update Trend Micro Worry-Free Business Security to the latest version provided by the vendor.