Vulnerability Description
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Interscan Messaging Security Virtual Appliance | <= 9.1 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-intersExploitThird Party Advisory
- https://success.trendmicro.com/solution/000279833ExploitVendor Advisory
- https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-intersExploitThird Party Advisory
- https://success.trendmicro.com/solution/000279833ExploitVendor Advisory
FAQ
What is CVE-2020-27016?
CVE-2020-27016 is a vulnerability with a CVSS score of 8.8 (HIGH). Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricki...
How severe is CVE-2020-27016?
CVE-2020-27016 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-27016?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Interscan Messaging Security Virtual Appliance, Microsoft Windows.