Vulnerability Name:

CVE-2018-3604 (CCN-137425)

Assigned:2017-12-27
Published:2018-01-09
Updated:2018-02-27
Summary:GetXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-89
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-3604

Source: XF
Type: UNKNOWN
trendmicro-cve20183604-code-exec(137425)

Source: CCN
Type: Trend Micro SECURITY BULLETIN 1119158
Trend Micro Control Manager 6.0 Multiple Vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
https://success.trendmicro.com/solution/1119158

Source: CCN
Type: ZDI-18-067
Trend Micro Control Manager sCloudService GetPassword SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-067/

Source: CCN
Type: ZDI-18-084
Trend Micro Control Manager GetRuleList SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-084/

Source: CCN
Type: ZDI-18-088
Trend Micro Control Manager sCloudService GetProductServerType SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-088/

Source: CCN
Type: ZDI-18-095
Trend Micro Control Manager sp_DDI_GetInterestedIPByJobID2 SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-095/

Source: CCN
Type: ZDI-18-096
Trend Micro Control Manager GetOnetimeSubscription SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-096/

Source: CCN
Type: ZDI-18-097
Trend Micro Control Manager GetScheduleSubscription SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-097/

Source: CCN
Type: ZDI-18-102
Trend Micro Control Manager GetChannelList SQL Injection Remote Code Execution Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-18-102/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:trendmicro:control_manager:6.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:trend_micro:control_manager:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    trendmicro control manager 6.0
    trend_micro control manager 6.0