This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Encryption for Email Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The flaw exists within the LauncherServer. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Encryption for Email |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-5552 is considered critical due to the potential for remote code execution.
To fix ZDI-CAN-5552, update your Trend Micro Encryption for Email Gateway to the latest patched version.
ZDI-CAN-5552 is a remote code execution vulnerability.
Organizations using vulnerable versions of Trend Micro Encryption for Email Gateway are affected by ZDI-CAN-5552.
Yes, authentication is required, but the vulnerability allows for bypassing the existing authentication mechanism.