Vulnerability Description
A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Interscan Web Security Virtual Appliance | 6.5 |
Related Weaknesses (CWE)
References
- https://success.trendmicro.com/solution/000281954Vendor Advisory
- https://www.tenable.com/security/research/tra-2020-63ExploitThird Party Advisory
- https://success.trendmicro.com/solution/000281954Vendor Advisory
- https://www.tenable.com/security/research/tra-2020-63ExploitThird Party Advisory
FAQ
What is CVE-2020-28581?
CVE-2020-28581 is a vulnerability with a CVSS score of 7.2 (HIGH). A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP message...
How severe is CVE-2020-28581?
CVE-2020-28581 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-28581?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Interscan Web Security Virtual Appliance.