Credentials management in InterScan Web Security Virtual Appliance



| Updated: 2020-08-08
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-9490
CWE-ID CWE-255
Exploitation vector Network
Public exploit N/A
Vulnerable software
InterScan Web Security Virtual Appliance (IWSVA)
Server applications / Server solutions for antivurus protection

Vendor Trend Micro

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Credentials management

EUVDB-ID: #VU36024

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2019-9490

CWE-ID: CWE-255 - Credentials Management

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to execute arbitrary code.

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.

Mitigation

Install update from vendor's website.

Vulnerable software versions

InterScan Web Security Virtual Appliance (IWSVA): 6.5

CPE2.3 External links

https://www.securityfocus.com/bid/107848
https://success.trendmicro.com/solution/1122326


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###