Arbitrary File Write Vulnerability in Trend Micro Email Encryption Gateway
CVE-2018-6220
9.8CRITICAL
Key Information:
- Vendor
- Trend Micro
- Vendor
- CVE Published:
- 15 March 2018
Summary
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 can be exploited by attackers to inject arbitrary files into the server, potentially leading to unauthorized code execution. This flaw poses significant risks as it enables attackers to manipulate files or execute malicious scripts without proper validation, compromising system integrity and security. Organizations using this product should prioritize applying updates and implementing security measures to mitigate this risk.
Affected Version(s)
Trend Micro Email Encryption Gateway 5.5
References
EPSS Score
11% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved