First published: Mon May 10 2021(Updated: )
A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Im Security | =1.6 | |
Trendmicro Im Security | =1.6.5 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-31520.
The severity level of CVE-2021-31520 is high (8.1).
CVE-2021-31520 allows remote attackers to bypass authentication on affected installations of Trend Micro IM Security.
No, authentication is not required to exploit CVE-2021-31520.
To fix CVE-2021-31520, it is recommended to update to a patched version of Trend Micro IM Security.