[Japanese]
|
JVNDB-2023-002100
|
Security updates for multiple Trend Micro products for enterprises (June 2023)
|
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [NVD Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
|
|
Trend Micro, Inc.
- Apex Central
- Apex One
- Apex One as a Service
- Trend Micro Mobile Security 9.8 SP5
|
|
Mobile Security (Enterprise) 9.8 SP5
Arbitrary file deletion due to unauthenticated path traversal - CVE-2023-32521
Arbitrary file deletion due to authenticated path traversal - CVE-2023-32522
Unauthorized access due to authentication bypass - CVE-2023-32523, CVE-2023-32524
Unrestricted file upload - CVE-2023-32525, CVE-2023-32526
Arbitrary command execution due to local file inclusion - CVE-2023-32527, CVE-2023-32528
Apex One 2019 (On-prem), Apex One as a Service
Registry key removal due to privilege escalation - CVE-2023-30902
Information disclosure due to improper access control - CVE-2023-32552, CVE-2023-32553
Privilege escalation due to Time-of-check Time-of-use (TOCTOU) vulnerability - CVE-2023-32554, CVE-2023-32555
Information disclosure due to link following vulnerability - CVE-2023-32556
Code execution due to path traversal vulnerability - CVE-2023-32557
Privilege escalation due to untrusted search path vulnerability - CVE-2023-34144, CVE-2023-34145
Privilege escalation due to exposure of dangerous method/function vulnerability - CVE-2023-34146, CVE-2023-34147, CVE-2023-34148
Apex Central 2019 (On-prem)
Code execution due to SQL injection - CVE-2023-32529, CVE-2023-32530
Code execution due to XSS - CVE-2023-32531, CVE-2023-32532, CVE-2023-32533, CVE-2023-32534, CVE-2023-32535
Reflected XSS under authenticated conditions due to user input validation and sanitization issues - CVE-2023-32536, CVE-2023-32537, CVE-2023-32604, CVE-2023-32605
|
[Update the Software and Apply Additional Configuration]
Update the software to the latest version according to the information provided by the developer.
The issues in Apex One as a Service are fixed in the April and May 2023 Maintenance.
After the updates, apply the additional configuration as a countermeasure against CVE-2023-32552 and CVE-2023-32553.
For details, refer to the information provided by the developer.
|
Trend Micro, Inc.
|
- Path Traversal(CWE-22) [NVD Evaluation]
- Improper Authentication(CWE-287) [NVD Evaluation]
- No Mapping(CWE-noinfo) [NVD Evaluation]
- Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367) [NVD Evaluation]
- Link Following(CWE-59) [NVD Evaluation]
- Untrusted Search Path(CWE-426) [NVD Evaluation]
- Improper Privilege Management(CWE-269) [NVD Evaluation]
- SQL Injection(CWE-89) [NVD Evaluation]
- Cross-site Scripting(CWE-79) [NVD Evaluation]
- No Mapping(CWE-Other) [NVD Evaluation]
|
- CVE-2023-32521
- CVE-2023-32522
- CVE-2023-32523
- CVE-2023-32524
- CVE-2023-32525
- CVE-2023-32526
- CVE-2023-32527
- CVE-2023-32528
- CVE-2023-30902
- CVE-2023-32552
- CVE-2023-32553
- CVE-2023-32554
- CVE-2023-32555
- CVE-2023-32556
- CVE-2023-32557
- CVE-2023-34144
- CVE-2023-34145
- CVE-2023-34146
- CVE-2023-34147
- CVE-2023-34148
- CVE-2023-32529
- CVE-2023-32530
- CVE-2023-32531
- CVE-2023-32532
- CVE-2023-32533
- CVE-2023-32534
- CVE-2023-32535
- CVE-2023-32536
- CVE-2023-32537
- CVE-2023-32604
- CVE-2023-32605
|
- JVN : JVNVU#91852506
- JVN : JVNVU#93384719
- National Vulnerability Database (NVD) : CVE-2023-30902
- National Vulnerability Database (NVD) : CVE-2023-32521
- National Vulnerability Database (NVD) : CVE-2023-32522
- National Vulnerability Database (NVD) : CVE-2023-32523
- National Vulnerability Database (NVD) : CVE-2023-32524
- National Vulnerability Database (NVD) : CVE-2023-32525
- National Vulnerability Database (NVD) : CVE-2023-32526
- National Vulnerability Database (NVD) : CVE-2023-32527
- National Vulnerability Database (NVD) : CVE-2023-32528
- National Vulnerability Database (NVD) : CVE-2023-32552
- National Vulnerability Database (NVD) : CVE-2023-32553
- National Vulnerability Database (NVD) : CVE-2023-32554
- National Vulnerability Database (NVD) : CVE-2023-32555
- National Vulnerability Database (NVD) : CVE-2023-32556
- National Vulnerability Database (NVD) : CVE-2023-32557
- National Vulnerability Database (NVD) : CVE-2023-34144
- National Vulnerability Database (NVD) : CVE-2023-34145
- National Vulnerability Database (NVD) : CVE-2023-34146
- National Vulnerability Database (NVD) : CVE-2023-34147
- National Vulnerability Database (NVD) : CVE-2023-32529
- National Vulnerability Database (NVD) : CVE-2023-32530
- National Vulnerability Database (NVD) : CVE-2023-32531
- National Vulnerability Database (NVD) : CVE-2023-32532
- National Vulnerability Database (NVD) : CVE-2023-32533
- National Vulnerability Database (NVD) : CVE-2023-32534
- National Vulnerability Database (NVD) : CVE-2023-32535
- National Vulnerability Database (NVD) : CVE-2023-32536
- National Vulnerability Database (NVD) : CVE-2023-32537
- National Vulnerability Database (NVD) : CVE-2023-32604
- National Vulnerability Database (NVD) : CVE-2023-32605
- National Vulnerability Database (NVD) : CVE-2023-34148
|
- [2023/06/14]
Web page was published
- [2023/07/25]
References : Content was added
- [2024/05/23]
CVSS Severity was modified
CWE was modified
References : Contents were added
|