iTnews Asia
  • Home
  • News
  • Security

Trend Micro discloses vulnerabilities in enterprise products

Trend Micro discloses vulnerabilities in enterprise products

Including authentication bypass.

By Richard Chirgwin on May 15, 2023 11:30AM

Trend Micro has disclosed details of eight CVEs in its Mobile Security for Enterprise 9.8 product suite, three of which are rated critical severity.

Some of the bugs were discovered through the Zero Day Initiative (ZDI), while others were reported to Trend Micro by Poh Jia Hao of STAR Labs and Tenable Security.

ZDI advisories identify CVE-2023-32523 and CVE-2023-32524, both authentication bypass bugs, as critical vulnerabilities.

They are both exploitable by remote attackers.

According to the ZDI, the bug “exists within the WFUser class defined within the web/widget path”, and is an improper implementation of authentication.

Also rated critical is CVE-2023-32521, which Trend Micro describes only as an unauthenticated file deletion vulnerability. 

Trend Micro also advised of two lower-rated remote authentication bypasses, CVE-2023-32523 and CVE-2023-32524, which it said could possibly be chained with other vulnerabilities.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
security star labs tenable security trend micro

Related Articles

  • Identity is now the new cybersecurity battlefield
  • Why APAC organisations must rethink their cloud and AI security
  • Why is fragmentation the next big cybersecurity risk?
  • The maritime sector is now in the crosshairs of cybercriminals
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Identity is now the new cybersecurity battlefield

Identity is now the new cybersecurity battlefield

Why APAC organisations must rethink their cloud and AI security

Why APAC organisations must rethink their cloud and AI security

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.