iTnews Asia
  • Home
  • News
  • Security

Trend Micro discloses vulnerabilities in enterprise products

Trend Micro discloses vulnerabilities in enterprise products

Including authentication bypass.

By Richard Chirgwin on May 15, 2023 11:30AM

Trend Micro has disclosed details of eight CVEs in its Mobile Security for Enterprise 9.8 product suite, three of which are rated critical severity.

Some of the bugs were discovered through the Zero Day Initiative (ZDI), while others were reported to Trend Micro by Poh Jia Hao of STAR Labs and Tenable Security.

ZDI advisories identify CVE-2023-32523 and CVE-2023-32524, both authentication bypass bugs, as critical vulnerabilities.

They are both exploitable by remote attackers.

According to the ZDI, the bug “exists within the WFUser class defined within the web/widget path”, and is an improper implementation of authentication.

Also rated critical is CVE-2023-32521, which Trend Micro describes only as an unauthenticated file deletion vulnerability. 

Trend Micro also advised of two lower-rated remote authentication bypasses, CVE-2023-32523 and CVE-2023-32524, which it said could possibly be chained with other vulnerabilities.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
security star labs tenable security trend micro

Related Articles

  • How severe will ransomware attacks become in 2026?
  • Identity is now the new cybersecurity battlefield
  • Why APAC organisations must rethink their cloud and AI security
  • Why is fragmentation the next big cybersecurity risk?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

How severe will ransomware attacks become in 2026?

How severe will ransomware attacks become in 2026?

Acer Philippines reports security incident in third-party vendor system

Acer Philippines reports security incident in third-party vendor system

Why is fragmentation the next big cybersecurity risk?

Why is fragmentation the next big cybersecurity risk?

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.