cve/2021/CVE-2021-32459.md

18 lines
924 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-32459](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32459)
![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Home%20Network%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Hard%20Coded%20Password&color=brighgreen)
### Description
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241
#### Github
No PoCs found on GitHub currently.