Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.
2019-10-28T20:15:11.003
2025-02-12T20:44:22.337
Analyzed
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | trendmicro | officescan | 11.0 | Yes |
Application | trendmicro | officescan | xg | Yes |
Application | trendmicro | officescan | xg | Yes |
Operating System | microsoft | windows | - | No |