Please note: authentication is not required in order to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-43130 | An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances. Please note: authentication is not required in order to exploit this vulnerability. |
Tue, 22 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendmicro
Trendmicro cloud Edge |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:trendmicro:cloud_edge:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendmicro
Trendmicro cloud Edge |
|
| Metrics |
ssvc
|
Tue, 22 Oct 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances. Please note: authentication is not required in order to exploit this vulnerability. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-10-22T19:00:48.004Z
Reserved: 2024-10-09T19:03:26.733Z
Link: CVE-2024-48904
Updated: 2024-10-22T18:57:14.688Z
Status : Analyzed
Published: 2024-10-22T19:15:06.763
Modified: 2025-07-31T16:24:40.157
Link: CVE-2024-48904
No data.
OpenCVE Enrichment
No data.
EUVD