First published: Thu Jun 06 2024(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro InterScan Web Security Virtual Appliance. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP Inspection component. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Web Security Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-574 is classified as a high severity vulnerability due to its potential for privilege escalation.
To fix ZDI-24-574, ensure that you apply the latest available patches from Trend Micro for the InterScan Web Security Virtual Appliance.
ZDI-24-574 affects installations of Trend Micro InterScan Web Security Virtual Appliance that are not updated with the latest security patches.
Yes, authentication is required to exploit the ZDI-24-574 vulnerability.
The specific component affected by ZDI-24-574 is the HTTP Inspection component within the Trend Micro InterScan Web Security Virtual Appliance.