First published: Wed May 27 2020(Updated: )
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Interscan Web Security Virtual Appliance | =6.5 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-8605.
The title of this vulnerability is Trend Micro InterScan Web Security Virtual Appliance Command Injection Remote Code Execution Vulnerability.
The severity of CVE-2020-8605 is high with a CVSS score of 8.8.
The Trend Micro InterScan Web Security Virtual Appliance version 6.5 is affected by CVE-2020-8605.
Yes, authentication is required to exploit CVE-2020-8605.
You can find more information about CVE-2020-8605 at the following references: [1](http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html), [2](http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html), [3](https://success.trendmicro.com/solution/000253095).