This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro OfficeScan. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web console, which listens on TCP port 4343 by default. The issue results from improper access control. An attacker can leverage this vulnerability to disclose information from the application.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro OfficeScan XG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-11635 is classified as a high severity vulnerability due to its potential for remote information disclosure without authentication.
To mitigate ZDI-CAN-11635, users should update their Trend Micro OfficeScan installation to the latest patched version released by the vendor.
ZDI-CAN-11635 can lead to the disclosure of sensitive information accessible through the affected web console.
ZDI-CAN-11635 affects specific versions of Trend Micro OfficeScan that expose the web console without adequate security measures.
No, authentication is not required to exploit ZDI-CAN-11635, making it particularly concerning for affected installations.