First published: Fri May 12 2023(Updated: )
This vulnerability allows remote attackers to create arbitrary files on affected installations of Trend Micro Mobile Security for Enterprises. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Mobile Security for Enterprises |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20182 is considered high due to the ability of remote attackers to create arbitrary files.
To fix ZDI-CAN-20182, update to the latest version of Trend Micro Mobile Security for Enterprises that addresses this vulnerability.
ZDI-CAN-20182 allows remote attackers to exploit the vulnerability to create arbitrary files, potentially leading to further exploitation.
Organizations using Trend Micro Mobile Security for Enterprises are affected by ZDI-CAN-20182.
Yes, authentication is required to exploit ZDI-CAN-20182, but the existing mechanism can be bypassed.