Vulnerability Description
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Threat Discovery Appliance | 2.6.1062 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97599Third Party AdvisoryVDB Entry
- https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfExploitThird Party Advisory
- http://www.securityfocus.com/bid/97599Third Party AdvisoryVDB Entry
- https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfExploitThird Party Advisory
FAQ
What is CVE-2016-7552?
CVE-2016-7552 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can ...
How severe is CVE-2016-7552?
CVE-2016-7552 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-7552?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Threat Discovery Appliance.