SQL injection in Trend Micro Premium Security, Maximum Security, Internet Security and Antivirus+



Published: 2021-02-15
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-25251
CWE-ID CWE-89
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Premium Security
Client/Desktop applications / Antivirus software/Personal firewalls

Maximum Security
Client/Desktop applications / Antivirus software/Personal firewalls

Trend Micro Internet Security
Client/Desktop applications / Antivirus software/Personal firewalls

Antivirus+ Security
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Trend Micro

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) SQL injection

EUVDB-ID: #VU50685

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-25251

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows alocal user to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A local administrator can disable the program’s password protection to disable protection and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Premium Security: 2020 (v16) - 2021 (v17)

Maximum Security: 2020 (v16) - 2021 (v17)

Trend Micro Internet Security: 2020 (v16) - 2021 (v17)

Antivirus+ Security: 2020 (v16) - 2021 (v17)

External links

http://exchange.xforce.ibmcloud.com/vulnerabilities/196650


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###