Published:2020/03/18 Last Updated:2020/03/18
JVNVU#98100897
Multiple vulnerabilities in Trend Micro Worry-Free Business Security
Critical
Overview
Trend Micro Worry-Free Business Security contains multiple vulnerabilities.
Products Affected
- Trend Micro Worry-Free Business Security 10.0 SP1
- Trend Micro Worry-Free Business Security 9.5
- Trend Micro Worry-Free Business Security 9.0 SP3
Description
Trend Micro Worry-Free Business Security contains multiple vulnerabilities listed below.
- Integrity check at downloading components to agents may be bypassed - CVE-2020-8468
CVSS v3 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Base Score: 8.0 CVSS v2 AV:N/AC:H/Au:S/C:P/I:P/A:P Base Score: 4.6 - Arbitrary files on the administration server may be deleted with SYSTEM privileges - CVE-2020-8470
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H Base Score: 10.0 CVSS v2 AV:N/AC:L/Au:N/C:N/I:C/A:C Base Score: 9.4 - Arbitrary code may be executed remotely with SYSTEM privileges by abusing vulnerable DLL on the administration server - CVE-2020-8598
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 10.0 CVSS v2 AV:N/AC:L/Au:N/C:C/I:C/A:C Base Score: 10.0 - Directory traversal (CWE-22) - CVE-2020-8600
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Base Score: 8.6 CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5
Impact
- A remote attacker may alter components on Worry-Free Business Security - CVE-2020-8468
- A remote attacker may delete arbitrary files on the server - CVE-2020-8470
- A remote attacker may execute arbitrary code - CVE-2020-8598
- A remote attacker may manipulate specific files on the server and bypass authentication - CVE-2020-8600
Solution
Apply the Patch
Apply the appropriate patch according to the information provided by the developer.
The developer has released the patches listed below that contain the countermeasure to the vulnerabilities.
- Trend Micro Worry-Free Business Security 10.0 SP1 Patch 2190
- Trend Micro Worry-Free Business Security 9.5 CP 1525
- Trend Micro Worry-Free Business Security 9.0 SP3 CP 4417
Apply a Workaround
The following workaround may mitigate the impacts of the vulnerabilities.
- Block access to the server from untrusted network
Vendor Status
Vendor | Link |
Trend Micro Incorporated | SECURITY BULLETIN: Multiple Critical Vulnerabilities in Trend Micro Worry-Free Business Security |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2020-8468 |
CVE-2020-8470 |
|
CVE-2020-8598 |
|
CVE-2020-8600 |
|
JVN iPedia |
|