Lucene search

K
certCERTVU:248692
HistoryAug 18, 2015 - 12:00 a.m.

Trend Micro Deep Discovery threat appliance contains multiple vulnerabilities

2015-08-1800:00:00
www.kb.cert.org
13

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

49.9%

Overview

Multiple versions of the Trend Micro Deep Discovery threat appliance are vulnerable to cross-site scripting and authentication bypass.

Description

The Trend Micro Deep Discovery platform β€œenables you to detect, analyze, and respond to today’s stealthy, targeted attacks in real time.” It may be deployed on a network as an appliance. The Trend Micro Deep Discovery Threat Appliance version 3.7.1096 is vulnerable to cross-site scripting and authentication bypass.

CWE-79**: Improper Neutralization of Input During Web Page Generation (β€˜Cross-site Scripting’) -**CVE-2015-2872

The contentURL parameter of a request to index.html is not properly validated and vulnerable to reflected cross-site scripting.

CWE-425**: Direct Request (β€˜Forced Browsing’) -**CVE-2015-2873

Several URLs, including the system log, whitelist, and blacklist, are accessible to a non-administrator user by direct request. The pages do not properly check for authorization.

Trend Micro has released an advisory on these issues. The CVSS score below is based on CVE-2015-2873.


Impact

An authenticated user without administrator privileges may access and modify certain system configuration settings. An unauthenticated remote user may conduct cross-site scripting attacks.


Solution

Apply an update

Trend Micro has released updates to address this issue. Affected users are encouraged to update as soon as possible.

Affected versions are listed below with the patch number corresponding to the update (for example, if you use 3.8 English, update to 3.8.1263):

Affected Version (Version Number and Language) Updated Patch Version (Versions prior to the one listed here may be affected)
3.8 English 3.8.1263 - Critical Patch B1263
3.8 Japanese 3.8.2047 - Critical Patch B2047
3.7 English 3.7.1248 - Critical Patch B1248
3.7 Japanese 3.7.1228 - Critical Patch B1228
3.7 Simplified Chinese 3.7.1227 - Critical Patch B1227
3.6 English 3.6.1217 - Critical Patch B1217
3.5 English 3.5.1477 - Critical Patch B1477
3.5 Japanese 3.5.1554 - Critical Patch B1544
3.5 Simplified Chinese 3.5.1433 - Critical Patch B1433

Vendor Information

248692

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Trend Micro Affected

Notified: July 09, 2015 Updated: August 07, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 5.5 AV:N/AC:L/Au:S/C:P/I:P/A:N
Temporal 4.1 E:POC/RL:OF/RC:UR
Environmental 3.0 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to John Page (β€œhyp3rlinx”) for reporting this vulnerability to us.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-2872, CVE-2015-2873
Date Public: 2015-08-18 Date First Published:

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

49.9%