Lucene search

K
cve[email protected]CVE-2022-25331
HistoryFeb 24, 2022 - 3:15 a.m.

CVE-2022-25331

2022-02-2403:15:44
web.nvd.nist.gov
69
cve-2022-25331
trend micro
serverprotection
information server
remote attacker
vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.

Affected configurations

NVD
Node
trendmicroserverprotectMatch5.8emc
OR
trendmicroserverprotectMatch5.8netware
OR
trendmicroserverprotectMatch5.8windows
OR
trendmicroserverprotect_for_network_appliance_filerMatch5.8
Node
trendmicroserverprotect_for_storageMatch6.0
AND
microsoftwindowsMatch-

CNA Affected

[
  {
    "product": "Trend Micro ServerProtect for Storage",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "6.0"
      }
    ]
  },
  {
    "product": "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "5.8"
      }
    ]
  },
  {
    "product": "Trend Micro ServerProtect for EMC Celerra",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "5.8"
      }
    ]
  },
  {
    "product": "Trend Micro ServerProtect for Network Appliance Filers",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "5.8"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

Related for CVE-2022-25331