First published: Thu Feb 24 2022(Updated: )
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for EMC | =5.8 | |
Trend Micro ServerProtect for NetWare | =5.8 | |
Trend Micro ServerProtect for Windows | =5.8 | |
Trend Micro ServerProtect for Network Appliance Filers | =5.8 | |
Trend Micro ServerProtect | =6.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25329 is a critical vulnerability in Trend Micro ServerProtect 6.0/5.8 Information Server that allows an unauthenticated remote attacker to register to the server and perform authenticated actions.
CVE-2022-25329 exploits the use of a static credential by an unauthenticated remote attacker who has access to the Information Server.
CVE-2022-25329 has a severity rating of 9.8 (critical).
Trend Micro ServerProtect 6.0 and 5.8, as well as Trend Micro ServerProtect for Network Appliance Filer 5.8 and Trend Micro ServerProtect for Storage 6.0, are affected by CVE-2022-25329.
Apply the necessary security patches provided by Trend Micro ServerProtect to fix CVE-2022-25329.