CWE
400
Advisory Published
Updated

CVE-2021-25252

First published: Wed Mar 03 2021(Updated: )

Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.

Credit: security@trendmicro.com

Affected SoftwareAffected VersionHow to fix
Trendmicro Apex Central=2019
Microsoft Windows
Trendmicro Apex One=2019
Trendmicro Cloud Edge=5.0
Trendmicro Apex One
Apple macOS
Trendmicro Deep Security=10.0
Trendmicro Deep Security=11.0
Trendmicro Deep Security=12.0
Trendmicro Deep Security=20.0
Trendmicro Control Manager=7.0
Trendmicro Deep Discovery Analyzer=5.1
Trendmicro Deep Discovery Email Inspector=2.5
Trendmicro Deep Discovery Inspector=3.8
Trendmicro Interscan Messaging Security Virtual Appliance=9.1
Trendmicro Interscan Web Security Virtual Appliance=6.5
Trendmicro Officescan
Trendmicro Portal Protect=2.6
Trendmicro Scanmail=14.0
Trendmicro Scanmail For Ibm Domino=5.8
Linux Linux kernel
Trendmicro Serverprotect For Storage=6.0
Trendmicro Serverprotect=5.8
EMC Celerra Network Attached Storage
Novell NetWare
Trendmicro Serverprotect For Network Appliance Filers=5.8
Netapp Cluster Data Ontap
Trendmicro Safe Lock=1.1
Trendmicro Worry-free Business Security=10.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-25252?

    CVE-2021-25252 is a vulnerability in Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) that can be exploited by an attacker to cause a denial-of-service or system freeze.

  • Which software are affected by CVE-2021-25252?

    Trend Micro's Apex Central 2019, Trend Micro's Apex One and Worry-Free Business Security 2019, Trend Micro's Cloud Edge 5.0, Trend Micro's Deep Security 10.0/11.0/12.0/20.0, Trend Micro's Control Manager 7.0, Trend Micro's Deep Discovery Analyzer 5.1, Trend Micro's Deep Discovery Email Inspector 2.5, Trend Micro's Deep Discovery Inspector 3.8, Trend Micro's Interscan Messaging Security Virtual Appliance 9.1, Trend Micro's Interscan Web Security Virtual Appliance 6.5, Trend Micro's Officescan, Trend Micro's Portal Protect 2.6, Trend Micro's Scanmail 14.0, Trend Micro's Scanmail for IBM Domino 5.8, Trend Micro's Serverprotect for Storage 6.0, Trend Micro's Serverprotect 5.8, Trend Micro's Safe Lock 1.1, Trend Micro's Worry-free Business Security are affected by CVE-2021-25252.

  • How severe is CVE-2021-25252?

    CVE-2021-25252 has a severity rating of 5.5 (medium).

  • How can CVE-2021-25252 be fixed?

    To fix CVE-2021-25252, it is recommended to apply the latest security patches or updates provided by Trend Micro.

  • Where can I find more information about CVE-2021-25252?

    You can find more information about CVE-2021-25252 on the Trend Micro website at the following link: [https://success.trendmicro.com/solution/000285675](https://success.trendmicro.com/solution/000285675)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203