Vulnerability Description
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Email Encryption Gateway | 5.5 |
Related Weaknesses (CWE)
References
- https://success.trendmicro.com/solution/1119349PatchVendor Advisory
- https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-mulExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/44166/ExploitThird Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1119349PatchVendor Advisory
- https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-mulExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/44166/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-6223?
CVE-2018-6223 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset con...
How severe is CVE-2018-6223?
CVE-2018-6223 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-6223?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Email Encryption Gateway.