#VU60763 Use of hard-coded credentials in Trend Micro products - CVE-2022-25329

 

#VU60763 Use of hard-coded credentials in Trend Micro products - CVE-2022-25329

Published: February 22, 2022 / Updated: February 23, 2022


Vulnerability identifier: #VU60763
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2022-25329
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
ServerProtect for Storage (SPFS)
ServerProtect for EMC Celerra (SPEMC)
ServerProtect for Microsoft Windows / Novell Netware (SPNT)
ServerProtect for Network Appliance Filers (SPNAF)
Software vendor:
Trend Micro

Description

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code, when a specific command is typed in the console. A remote unauthenticated attacker with access to the Information Server can login using the hard-coded credentials and perform unauthorized actions.


Remediation

Install updates from vendor's website.

External links