Published:2020/11/27  Last Updated:2020/11/27

JVNVU#98890246
Multiple vulnerabilities in Trend Micro InterScan Messaging Virtual Appliance (IMSVA)

Overview

Trend Micro InterScan Messaging Virtual Appliance (IMSVA) provided by Trend Micro Incorporated contains multiple vulnerabilities.

Products Affected

  • Interscan Messaging Security Virtual Appliance (IMSVA) versions prior to 9.1.0 CP B2025

Description

Interscan Messaging Security Virtual Appliance (IMSVA) provided by Trend Micro Incorporated contains multiple vulnerabilities listed below.

  • Cross-site request forgery (CWE-352) - CVE-2020-27016
    CVSS v3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score: 7.5
  • Improper restriction of XML external entity processing (XXE) (CWE-611) - CVE-2020-27017
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L Base Score: 5.7
  • Server side request forgery (CWE-918) - CVE-2020-27018
    CVSS v3 CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N Base Score: 2.0
  • Information disclosure (CWE-200) - CVE-2020-27019
    CVSS v3 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L Base Score: 4.8
  • Use of password hash with insufficient computational effort (CWE-916) - CVE-2020-27693
    CVSS v3 CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L Base Score: 3.1
  • Use of unmaintained third party libraries (CWE-1104) - CVE-2020-27694
    CVSS v3 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L Base Score: 4.6

Impact

  • A remote attacker may alter policy rules such as malware checks and/or Email filtering rules - CVE-2020-27016
  • A remote attacker who obtained administrative privileges may read arbitrary local files on the product - CVE-2020-27017
  • An attacker who obtained administrative privileges may abuse the product's web server and grant access to web resources and/or parts of local files - CVE-2020-27018
  • An attacker may obtain specific information and/or keys in the product's database - CVE-2020-27019
  • An attacker may decipher a user's password, due to the product's weak password hash algorithm - CVE-2020-27693
  • A remote attacker may abuse the vulnerabilities in the outdated third party libraries used in the product - CVE-2020-27694

Solution

Apply the patch
Apply the appropriate patch according to the information provided by the developer.

Apply workaround
Applying the following workaround may mitigate the impacts of these vulnerabilities.

  • Block access from outside to the following ports.
    • 8445/TCP
    • 8446/TCP
    • 8447/TCP

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2020-27016
CVE-2020-27017
CVE-2020-27018
CVE-2020-27019
CVE-2020-27693
CVE-2020-27694
JVN iPedia