This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within processing of AdHocQuery_Processor. Due to the improper restriction of XML External Entity (XXE) reference, a specially crafted URI causes the XML parser to access the contents of this URI and embed these contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose sensitive information under the context of the Network Service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Control Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-5232 is classified as a high-severity vulnerability due to its potential for sensitive information disclosure.
To mitigate ZDI-CAN-5232, update your Trend Micro Control Manager to the latest version that addresses this vulnerability.
ZDI-CAN-5232 enables remote attackers to bypass authentication and access sensitive information.
Yes, authentication is required but can be bypassed, which increases the risk of exploitation.
Trend Micro Control Manager is the affected software for vulnerability ZDI-CAN-5232.