This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Worry-Free Business Security. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the TempFileName parameter provided to the cgiRecvFile.exe endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Worry-Free Business Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-307 is critical as it allows remote attackers to bypass authentication.
To fix ZDI-20-307, update Trend Micro Worry-Free Business Security to the latest version provided by the vendor.
The potential impacts of ZDI-20-307 include unauthorized access to system functions and data without authentication.
ZDI-20-307 affects Trend Micro Worry-Free Business Security installations.
No, authentication is not required to exploit the vulnerability described in ZDI-20-307.