First published: Fri Jul 05 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex One. Authentication is required to exploit this vulnerability. The specific flaw exists within the client management functionality. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of IUSR.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex One |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-897 is high due to its potential for remote code execution by authenticated attackers.
To fix ZDI-24-897, update Trend Micro Apex One to the latest version as recommended by the vendor.
ZDI-24-897 is classified as a remote code execution vulnerability affecting Trend Micro Apex One.
Any installation of Trend Micro Apex One that has not been patched against this vulnerability is affected.
Exploiting ZDI-24-897 requires authentication, meaning an attacker must have valid credentials.