Advisory Details

May 27th, 2020

Trend Micro InterScan Web Security Virtual Appliance Command Injection Remote Code Execution Vulnerability

ZDI-20-676
ZDI-CAN-10095

CVE ID CVE-2020-8605
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Trend Micro
AFFECTED PRODUCTS InterScan Web Security Virtual Appliance
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro InterScan Web Security Virtual Appliance. Authentication is required to exploit this vulnerability.

The specific flaw exists within the LogSettingHandler class. When parsing the mount_device parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

https://success.trendmicro.com/solution/000253095


DISCLOSURE TIMELINE
  • 2020-01-17 - Vulnerability reported to vendor
  • 2020-05-27 - Coordinated public release of advisory
  • 2020-05-28 - Advisory Updated
CREDIT Mehmet INCE (@mdisec)
BACK TO ADVISORIES