Intrusion Prevention



This indicates an attack attempt to exploit a Command Injection vulnerability in Trend Micro Virtual Mobile Infrastructure.
The vulnerability is due to an error when the vulnerable software attempts to handle a maliciously crafted user input. An attacker can exploit this to execute arbitrary commands within the context of the target system, via a crafted request.

Affected Products

Trend Micro Virtual Mobile Infrastructure 5.0 and prior


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the latest patch from the vendor.

CVE References