SB2022022218 - Multiple vulnerabilities in Trend Micro ServerProtect
Published: February 22, 2022 Updated: February 23, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use of hard-coded credentials (CVE-ID: CVE-2022-25329)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code, when a specific command is typed in the console. A remote unauthenticated attacker with access to the Information Server can login using the hard-coded credentials and perform unauthorized actions.
2) Integer overflow (CVE-ID: CVE-2022-25331)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote authenticated user can pass specially crafted data to the Information Server, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Uncaught Exception (CVE-ID: CVE-2022-25330)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncaught exceptions that can be generated by the application. A remote user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.