First published: Thu Feb 24 2022(Updated: )
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for EMC | =5.8 | |
Trend Micro ServerProtect for NetWare | =5.8 | |
Trend Micro ServerProtect for Windows | =5.8 | |
Trend Micro ServerProtect for Network Appliance Filers | =5.8 | |
Trend Micro ServerProtect | =6.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25331 refers to the vulnerability in Trend Micro ServerProtection 6.0/5.8 Information Server that can allow a remote attacker to crash the process.
CVE-2022-25331 has a severity rating of 7.5 (high).
CVE-2022-25331 affects Trend Micro ServerProtection versions 5.8 and 6.0.
A remote attacker can exploit CVE-2022-25331 to crash the process in Trend Micro ServerProtection 6.0/5.8 Information Server.
More information about CVE-2022-25331 can be found at the following references: [Link 1](https://success.trendmicro.com/solution/000290507), [Link 2](https://www.tenable.com/security/research/tra-2022-05).