A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://success.trendmicro.com/solution/000286439 | patch vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-525/ | third party advisory vdb entry |