First published: Fri May 12 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Mobile Security for Enterprises. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Mobile Security for Enterprises |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-587 is critical with a score of 9.8.
Remote attackers can exploit ZDI-23-587 by bypassing authentication on affected installations of Trend Micro Mobile Security for Enterprises without requiring any credentials.
The affected software of ZDI-23-587 is Trend Micro Mobile Security for Enterprises.
You can find more information about ZDI-23-587 at the following references: [http://www.zerodayinitiative.com/advisories/ZDI-23-587/](http://www.zerodayinitiative.com/advisories/ZDI-23-587/) and [https://success.trendmicro.com/solution/000293106](https://success.trendmicro.com/solution/000293106).
To fix ZDI-23-587, apply the necessary security patches provided by Trend Micro for the affected installations of Mobile Security for Enterprises.