This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Worry-Free Business Security. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the TempFileName parameter provided to the cgiRecvFile.exe endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Worry-Free Business Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-10073 is considered high due to the potential for remote attackers to bypass authentication.
To fix ZDI-CAN-10073, users should apply the latest security patches provided by Trend Micro for Worry-Free Business Security.
ZDI-CAN-10073 affects certain installations of Trend Micro Worry-Free Business Security specifically.
Yes, ZDI-CAN-10073 can be exploited without authentication, making it particularly dangerous.
The potential impacts of ZDI-CAN-10073 include unauthorized access and manipulation of the affected system.