Check Point Reference: | CPAI-2017-0512 |
Date Published: | 18 Jun 2017 |
Severity: | High |
Last Updated: | Wednesday 21 June, 2017 |
Source: | Trend Micro 1117412 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Trend Micro InterScan Web Security Virtual Appliance 6.5 prior to 6.5 SP2 HF 1755 |
Vulnerability Description | A command injection vulnerability exists in Trend Micro IWSVA. This vulnerability is due to incorrect validation of the netid, netmask, router, and interface_vlanid_sel HTTP parameters by the ManageSRouteSettings Servlet. A remote authenticated attacker could exploit this vulnerability by sending a crafted request. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Trend Micro ServerProtect Protection Violation.
Attack Information: Trend Micro IWSVA ManageSRouteSettings HttpServlet Command Injection