Description
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17280 | A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability. |
References
| Link | Providers |
|---|---|
| https://success.trendmicro.com/solution/000268419 |
|
History
No history.
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-04T15:19:07.396Z
Reserved: 2020-08-20T00:00:00.000Z
Link: CVE-2020-24561
No data.
Status : Modified
Published: 2020-09-15T20:15:13.337
Modified: 2024-11-21T05:14:59.730
Link: CVE-2020-24561
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD