SB2022022218 - Multiple vulnerabilities in Trend Micro ServerProtect



SB2022022218 - Multiple vulnerabilities in Trend Micro ServerProtect

Published: February 22, 2022 Updated: February 23, 2022

Security Bulletin ID SB2022022218
Severity
Critical
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 33% High 33% Medium 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use of hard-coded credentials (CVE-ID: CVE-2022-25329)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code, when a specific command is typed in the console. A remote unauthenticated attacker with access to the Information Server can login using the hard-coded credentials and perform unauthorized actions.


2) Integer overflow (CVE-ID: CVE-2022-25331)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow. A remote authenticated user can pass specially crafted data to the Information Server, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Uncaught Exception (CVE-ID: CVE-2022-25330)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to uncaught exceptions that can be generated by the application. A remote user can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.