Trend.Micro.OfficeScan.Proxy.PHP.Command.Injection
Description
This indicates an attack attempt to exploit a Command Execution vulnerability in Trend Micro's OfficeScan.
The vulnerability is due to improper validation of HTTP request parameters. A remote attacker may be able to exploit this to execute arbitrary command within the context of the process, via a crafted HTTP request.
Affected Products
Trend Micro OfficeScan XG (12.0) prior to CP 1641 r1
Trend Micro OfficeScan prior to 11.0 SP1 CP 6392 r1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrades or patches from the vendor.
https://success.trendmicro.com/solution/1117769
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-01 | 25.612 | Name:TrendMicro. OfficeScan. Proxy. PHP. Command. Injection:Trend. Micro. OfficeScan. Proxy. PHP. Command. Injection |
2019-06-13 | 14.632 | Severity:high:critical |