CWE
400
Advisory Published
Updated

CVE-2021-25252

First published: Wed Mar 03 2021(Updated: )

Credit: security@trendmicro.com

Affected SoftwareAffected VersionHow to fix
Trendmicro Apex Central=2019
Microsoft Windows
Trend Micro Trend Micro Apex One and Worry-Free Business Security=2019
=5.0
Trend Micro Trend Micro Apex One and Worry-Free Business Security
Apple macOS
Trendmicro Deep Security=10.0
Trendmicro Deep Security=11.0
Trendmicro Deep Security=12.0
Trendmicro Deep Security=20.0
Trendmicro Control Manager=7.0
=5.1
Trendmicro Deep Discovery Email Inspector=2.5
Trendmicro Deep Discovery Inspector=3.8
Trendmicro Interscan Messaging Security Virtual Appliance=9.1
Trendmicro Interscan Web Security Virtual Appliance=6.5
Trendmicro Officescan
=2.6
Trendmicro Scanmail=14.0
=5.8
Linux Linux kernel
Trendmicro Serverprotect For Storage=6.0
Trendmicro Serverprotect=5.8
EMC Celerra Network Attached Storage
Novell NetWare
=5.8
Netapp Cluster Data Ontap
Trendmicro Safe Lock=1.1
Trendmicro Worry-free Business Security=10.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-25252?

    CVE-2021-25252 is a vulnerability in Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) that can be exploited by an attacker to cause a denial-of-service or system freeze.

  • Which software are affected by CVE-2021-25252?

    Trend Micro's Apex Central 2019, Trend Micro's Apex One and Worry-Free Business Security 2019, Trend Micro's Cloud Edge 5.0, Trend Micro's Deep Security 10.0/11.0/12.0/20.0, Trend Micro's Control Manager 7.0, Trend Micro's Deep Discovery Analyzer 5.1, Trend Micro's Deep Discovery Email Inspector 2.5, Trend Micro's Deep Discovery Inspector 3.8, Trend Micro's Interscan Messaging Security Virtual Appliance 9.1, Trend Micro's Interscan Web Security Virtual Appliance 6.5, Trend Micro's Officescan, Trend Micro's Portal Protect 2.6, Trend Micro's Scanmail 14.0, Trend Micro's Scanmail for IBM Domino 5.8, Trend Micro's Serverprotect for Storage 6.0, Trend Micro's Serverprotect 5.8, Trend Micro's Safe Lock 1.1, Trend Micro's Worry-free Business Security are affected by CVE-2021-25252.

  • How severe is CVE-2021-25252?

    CVE-2021-25252 has a severity rating of 5.5 (medium).

  • How can CVE-2021-25252 be fixed?

    To fix CVE-2021-25252, it is recommended to apply the latest security patches or updates provided by Trend Micro.

  • Where can I find more information about CVE-2021-25252?

    You can find more information about CVE-2021-25252 on the Trend Micro website at the following link: [https://success.trendmicro.com/solution/000285675](https://success.trendmicro.com/solution/000285675)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203