Description
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
Affected Software
Related
{"id": "CVE-2021-36745", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-36745", "description": "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.", "published": "2021-09-29T11:15:00", "modified": "2022-07-12T17:42:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36745", "reporter": "security@trendmicro.com", "references": ["https://success.trendmicro.com/solution/000289038", "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", "https://success.trendmicro.com/jp/solution/000289030"], "cvelist": ["CVE-2021-36745"], "immutableFields": [], "lastseen": "2022-07-13T17:20:03", "viewCount": 54, "enchantments": {"dependencies": {"references": [{"type": "nessus", "idList": ["TRENDMICRO_SERVERPROTECT_CVE-2021-36745.NBIN"]}, {"type": "zdi", "idList": ["ZDI-21-1115"]}], "rev": 4}, "score": {"value": 5.8, "vector": "NONE"}, "backreferences": {"references": [{"type": "nessus", "idList": ["TRENDMICRO_SERVERPROTECT_CVE-2021-36745.NBIN"]}, {"type": "zdi", "idList": ["ZDI-21-1115"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "trendmicro serverprotect", "version": 5}, {"name": "trendmicro serverprotect", "version": 6}, {"name": "trendmicro serverprotect", "version": 5}, {"name": "trendmicro serverprotect", "version": 5}, {"name": "trendmicro serverprotect", "version": 5}]}, "vulnersScore": 5.8}, "_state": {"dependencies": 1659914120, "score": 1659847081, "affected_software_major_version": 1671597168}, "_internal": {"score_hash": "8a2ea493c394782c0bbb2665ca15866a"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:trendmicro:serverprotect:6.0", "cpe:/a:trendmicro:serverprotect:5.8"], "cpe23": ["cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netapp:*:*", "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*"], "cwe": ["CWE-425"], "affectedSoftware": [{"cpeName": "trendmicro:serverprotect", "version": "5.8", "operator": "eq", "name": "trendmicro serverprotect"}, {"cpeName": "trendmicro:serverprotect", "version": "6.0", "operator": "eq", "name": "trendmicro serverprotect"}, {"cpeName": "trendmicro:serverprotect", "version": "5.8", "operator": "eq", "name": "trendmicro serverprotect"}, {"cpeName": "trendmicro:serverprotect", "version": "5.8", "operator": "eq", "name": "trendmicro serverprotect"}, {"cpeName": "trendmicro:serverprotect", "version": "5.8", "operator": "eq", "name": "trendmicro serverprotect"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netapp:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://success.trendmicro.com/solution/000289038", "name": "https://success.trendmicro.com/solution/000289038", "refsource": "MISC", "tags": ["Patch", "Vendor Advisory"]}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", "refsource": "MISC", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://success.trendmicro.com/jp/solution/000289030", "name": "https://success.trendmicro.com/jp/solution/000289030", "refsource": "MISC", "tags": ["Patch", "Vendor Advisory"]}]}
{"zdi": [{"lastseen": "2022-01-31T22:17:29", "description": "This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro ServerProtect. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ServerProtect console. The issue results from the lack of proper validation prior to authentication. An attacker can leverage this vulnerability to bypass authentication on the system.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-09-26T00:00:00", "type": "zdi", "title": "Trend Micro ServerProtect Authentication Bypass Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-36745"], "modified": "2021-09-26T00:00:00", "id": "ZDI-21-1115", "href": "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-01-11T14:56:38", "description": "An authentication bypass vulnerability exists in the Trend Micro ServerProtect Information Server due to the lack of proper validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass authentication and gain access to the server.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-22T00:00:00", "type": "nessus", "title": "Trend Micro ServerProtect Authentication Bypass Vulnerability (CVE-2021-36745)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-36745"], "modified": "2022-11-30T00:00:00", "cpe": ["cpe:/a:trend_micro:serverprotect"], "id": "TRENDMICRO_SERVERPROTECT_CVE-2021-36745.NBIN", "href": "https://www.tenable.com/plugins/nessus/154351", "sourceData": "Binary data trendmicro_serverprotect_cve-2021-36745.nbin", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}