First published: Wed Sep 29 2021(Updated: )
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Serverprotect | =5.8 | |
Trendmicro Serverprotect | =5.8 | |
Trendmicro Serverprotect | =5.8 | |
Trendmicro Serverprotect | =5.8 | |
Trendmicro Serverprotect | =6.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36745 is a vulnerability in Trend Micro ServerProtect that allows remote attackers to bypass authentication.
CVE-2021-36745 can be exploited by remote attackers who do not require authentication to access affected installations of Trend Micro ServerProtect.
CVE-2021-36745 has a severity rating of 9.8 out of 10, which is considered critical.
Versions 5.8 and 6.0 of Trend Micro ServerProtect are affected by CVE-2021-36745.
Yes, Trend Micro has released patches to address the vulnerability. It is recommended to update to the latest version of Trend Micro ServerProtect.