Lucene search

K
cve[email protected]CVE-2023-32523
HistoryJun 26, 2023 - 10:15 p.m.

CVE-2023-32523

2023-06-2622:15:10
CWE-287
web.nvd.nist.gov
13
trend micro
mobile security
enterprise
9.8 sp5
authentication bypass
remote code execution

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.4%

Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.

This is similar to, but not identical to CVE-2023-32524.

Affected configurations

NVD
Node
trendmicromobile_securityMatch9.8sp5enterprisewindows

CNA Affected

[
  {
    "vendor": "Trend Micro, Inc.",
    "product": "Trend Micro Moibile Security for Enterprise",
    "versions": [
      {
        "version": "9.8 SP5",
        "status": "affected",
        "versionType": "semver",
        "lessThan": "9.8.3294"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.4%

Related for CVE-2023-32523