First published: Thu Oct 17 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Cloud Edge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the REST API, which listens on TCP port 8443 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Cloud Edge |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-23182 has been assigned a critical severity rating due to its potential for remote code execution.
To fix ZDI-CAN-23182, users should apply the latest security patches provided by Trend Micro for Cloud Edge.
No, ZDI-CAN-23182 does not require authentication, allowing remote attackers to exploit the vulnerability easily.
The specific component affected by ZDI-CAN-23182 is the REST API that listens on TCP port 8443.
Yes, ZDI-CAN-23182 can impact any organization using affected installations of Trend Micro Cloud Edge.