An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances. Please note: authentication is not required in order to exploit this vulnerability.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://success.trendmicro.com/en-US/solution/KA-0017998 | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-1418/ | third party advisory |