This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro OfficeScan. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web console, which listens on TCP port 4343 by default. The issue results from improper access control. An attacker can leverage this vulnerability to disclose information from the application.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro OfficeScan XG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-11633 is classified as critical due to the potential for remote attackers to disclose sensitive information.
ZDI-CAN-11633 allows remote attackers to access confidential information without authentication on affected installations of Trend Micro OfficeScan.
To address ZDI-CAN-11633, it's recommended to apply the latest security patches provided by Trend Micro for OfficeScan.
ZDI-CAN-11633 affects certain installations of Trend Micro OfficeScan XG.
No, authentication is not required to exploit ZDI-CAN-11633, making it particularly dangerous.