Vulnerability Description
Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary commands on the system as root via Patch Update functionality. This was resolved in Version 6.5 CP 1737.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Interscan Web Security Virtual Appliance | <= 6.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96252
- http://www.securitytracker.com/id/1037849
- https://success.trendmicro.com/solution/1116672PatchVendor Advisory
- http://www.securityfocus.com/bid/96252
- http://www.securitytracker.com/id/1037849
- https://success.trendmicro.com/solution/1116672PatchVendor Advisory
FAQ
What is CVE-2016-9269?
CVE-2016-9269 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, ...
How severe is CVE-2016-9269?
CVE-2016-9269 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-9269?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Interscan Web Security Virtual Appliance.