First published: Wed Sep 29 2021(Updated: )
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | ||
Trend Micro ServerProtect for EMC | =5.8 | |
trendmicro ServerProtect netapp | =5.8 | |
Trend Micro ServerProtect for NetWare | =5.8 | |
Trend Micro ServerProtect for Windows | =5.8 | |
Trend Micro ServerProtect for Storage | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36745 is a vulnerability in Trend Micro ServerProtect that allows remote attackers to bypass authentication.
CVE-2021-36745 can be exploited by remote attackers who do not require authentication to access affected installations of Trend Micro ServerProtect.
CVE-2021-36745 has a severity rating of 9.8 out of 10, which is considered critical.
Versions 5.8 and 6.0 of Trend Micro ServerProtect are affected by CVE-2021-36745.
Yes, Trend Micro has released patches to address the vulnerability. It is recommended to update to the latest version of Trend Micro ServerProtect.