CERTFR-2021-AVI-159
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Trend Micro. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Trend Micro N/A Worry-Free Business Security version antérieures à 10.1 SP1 Patch 2274 (pour Windows)
Trend Micro N/A InterScan Messaging Security Virtual Appliance version antérieures à 9.1 CP2034
Trend Micro N/A ServerProtect for EMC Celerra version antérieures à 5.8 CP1573 EMC Celerra
Trend Micro N/A OfficeScan version antérieures à XG SP1 CP6040 (pour Windows)
Trend Micro N/A ServerProtect for Windows/Netware version antérieures à 5.8 CP1571
Trend Micro N/A Control Manager version antérieures à 7.0 CP 3215 (pour Windows)
Trend Micro N/A ScanMail for IBM Domino version antérieures à 5.8 CP1083 (pour Windows et Linux)
Trend Micro N/A InterScan Web Security Virtual Appliance version antérieures à 6.5 CP1926
Trend Micro N/A Deep Discovery Analyzer version antérieures à 5.1+ correctif via ActiveUpdate
Trend Micro N/A ServerProtect for Network Appliance Filers version antérieures à 5.8 CP1295 NetApp
Trend Micro N/A Deep Security version antérieures à DS 20.0 LTS (correctif du 18 janvier 2021)
Trend Micro Deep Discovery Inspector Deep Discovery Inspector version antérieures à 3.8+ correctif via ActiveUpdate
Trend Micro N/A ServerProtect for Storage version antérieures à 6.0 CP1274 (pour Windows)
Trend Micro N/A Deep Security version antérieures à DS 12.0 U15
Trend Micro N/A Deep Security version antérieures à DS 11.0 U25
Trend Micro N/A Safe Lock TXOne Edition version antérieures à 1.1 CP1042 (pour Windows)
Trend Micro N/A PortalProtect version antérieures à 2.6 CP1045 (pour Windows)
Trend Micro N/A Deep Discovery Email Inspector version antérieures à 2.5+ correctif via ActiveUpdate
Trend Micro N/A Cloud Edge version antérieures à 5.0+ correctif via ActiveUpdate
Trend Micro N/A Deep Security version antérieures à DS 10.0 U29
Trend Micro Apex One Apex One version antérieures à 2019 CP9167 (On Premise) SaaS (B2101) (pour Windows et macOS)
Trend Micro N/A ScanMail for Exchange version antérieures à 14.0 CP3083 (pour Windows)
Trend Micro N/A ServerProtect for Linux version antérieures à 3.0 CP1649
Trend Micro N/A Apex Central version antérieures à 2019 CP5534 SaaS (pour Windows)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Worry-Free Business Security version ant\u00e9rieures \u00e0 10.1 SP1 Patch 2274 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "InterScan Messaging Security Virtual Appliance version ant\u00e9rieures \u00e0 9.1 CP2034",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ServerProtect for EMC Celerra version ant\u00e9rieures \u00e0 5.8 CP1573 EMC Celerra",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "OfficeScan version ant\u00e9rieures \u00e0 XG SP1 CP6040 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ServerProtect for Windows/Netware version ant\u00e9rieures \u00e0 5.8 CP1571",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Control Manager version ant\u00e9rieures \u00e0 7.0 CP 3215 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ScanMail for IBM Domino version ant\u00e9rieures \u00e0 5.8 CP1083 (pour Windows et Linux)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "InterScan Web Security Virtual Appliance version ant\u00e9rieures \u00e0 6.5 CP1926",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Discovery Analyzer version ant\u00e9rieures \u00e0 5.1+ correctif via ActiveUpdate",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ServerProtect for Network Appliance Filers version ant\u00e9rieures \u00e0 5.8 CP1295 NetApp",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Security version ant\u00e9rieures \u00e0 DS 20.0 LTS (correctif du 18 janvier 2021)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Discovery Inspector version ant\u00e9rieures \u00e0 3.8+ correctif via ActiveUpdate",
      "product": {
        "name": "Deep Discovery Inspector",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ServerProtect for Storage version ant\u00e9rieures \u00e0 6.0 CP1274 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Security version ant\u00e9rieures \u00e0 DS 12.0 U15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Security version ant\u00e9rieures \u00e0 DS 11.0 U25",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Safe Lock TXOne Edition version ant\u00e9rieures \u00e0 1.1 CP1042 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "PortalProtect version ant\u00e9rieures \u00e0 2.6 CP1045 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Discovery Email Inspector version ant\u00e9rieures \u00e0 2.5+ correctif via ActiveUpdate",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Edge version ant\u00e9rieures \u00e0 5.0+ correctif via ActiveUpdate",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Deep Security version ant\u00e9rieures \u00e0 DS 10.0 U29",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Apex One version ant\u00e9rieures \u00e0 2019 CP9167 (On Premise) SaaS (B2101) (pour Windows et macOS)",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ScanMail for Exchange version ant\u00e9rieures \u00e0 14.0 CP3083 (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "ServerProtect for Linux version ant\u00e9rieures \u00e0 3.0 CP1649",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Apex Central version ant\u00e9rieures \u00e0 2019 CP5534 SaaS (pour Windows)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-25252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25252"
    }
  ],
  "initial_release_date": "2021-03-03T00:00:00",
  "last_revision_date": "2021-03-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-159",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-03-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Trend Micro. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Trend Micro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Trend Micro 000285675 du 02 mars 2021",
      "url": "https://success.trendmicro.com/solution/000285675"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…