Lucene search

K
zdiAlain Homewood (Insomnia Security)ZDI-18-218
HistoryFeb 28, 2018 - 12:00 a.m.

Trend Micro Smart Protection Server Auth Command Injection Authentication Bypass Vulnerability

2018-02-2800:00:00
Alain Homewood (Insomnia Security)
www.zerodayinitiative.com
9

0.004 Low

EPSS

Percentile

75.0%

This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Trend Micro Smart Protection Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of credentials provided at login. When parsing the username, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.

0.004 Low

EPSS

Percentile

75.0%

Related for ZDI-18-218