This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Trend Micro Smart Protection Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of credentials provided at login. When parsing the username, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Smart Protection Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-5625 is critical as it allows remote attackers to escalate privileges without authentication.
To fix ZDI-CAN-5625, update your Trend Micro Smart Protection Server to the latest patched version provided by the vendor.
ZDI-CAN-5625 affects installations of Trend Micro Smart Protection Server that have not been updated with the latest security patches.
Yes, ZDI-CAN-5625 can be exploited remotely since it does not require authentication to escalate privileges.
ZDI-CAN-5625 is a privilege escalation vulnerability related to credential handling during login.