jvndb-2023-002100
Vulnerability from jvndb
Published
2023-06-14 14:47
Modified
2024-05-23 15:23
Severity ?
Summary
Security updates for multiple Trend Micro products for enterprises (June 2023)
Details
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
JVN https://jvn.jp/en/vu/JVNVU91852506/
JVN https://jvn.jp/en/vu/JVNVU93384719/index.html
CVE https://www.cve.org/CVERecord?id=CVE-2023-32521
CVE https://www.cve.org/CVERecord?id=CVE-2023-32522
CVE https://www.cve.org/CVERecord?id=CVE-2023-32523
CVE https://www.cve.org/CVERecord?id=CVE-2023-32524
CVE https://www.cve.org/CVERecord?id=CVE-2023-32525
CVE https://www.cve.org/CVERecord?id=CVE-2023-32526
CVE https://www.cve.org/CVERecord?id=CVE-2023-32527
CVE https://www.cve.org/CVERecord?id=CVE-2023-32528
CVE https://www.cve.org/CVERecord?id=CVE-2023-30902
CVE https://www.cve.org/CVERecord?id=CVE-2023-32552
CVE https://www.cve.org/CVERecord?id=CVE-2023-32553
CVE https://www.cve.org/CVERecord?id=CVE-2023-32554
CVE https://www.cve.org/CVERecord?id=CVE-2023-32555
CVE https://www.cve.org/CVERecord?id=CVE-2023-32556
CVE https://www.cve.org/CVERecord?id=CVE-2023-32557
CVE https://www.cve.org/CVERecord?id=CVE-2023-34144
CVE https://www.cve.org/CVERecord?id=CVE-2023-34145
CVE https://www.cve.org/CVERecord?id=CVE-2023-34146
CVE https://www.cve.org/CVERecord?id=CVE-2023-34147
CVE https://www.cve.org/CVERecord?id=CVE-2023-34148
CVE https://www.cve.org/CVERecord?id=CVE-2023-32529
CVE https://www.cve.org/CVERecord?id=CVE-2023-32530
CVE https://www.cve.org/CVERecord?id=CVE-2023-32531
CVE https://www.cve.org/CVERecord?id=CVE-2023-32532
CVE https://www.cve.org/CVERecord?id=CVE-2023-32533
CVE https://www.cve.org/CVERecord?id=CVE-2023-32534
CVE https://www.cve.org/CVERecord?id=CVE-2023-32535
CVE https://www.cve.org/CVERecord?id=CVE-2023-32536
CVE https://www.cve.org/CVERecord?id=CVE-2023-32537
CVE https://www.cve.org/CVERecord?id=CVE-2023-32604
CVE https://www.cve.org/CVERecord?id=CVE-2023-32605
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-30902
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32521
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32522
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32523
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32524
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32525
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32526
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32527
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32528
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32552
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32553
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32554
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32555
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32556
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32557
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34144
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34145
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34146
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34147
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32529
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32530
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32531
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32532
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32533
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32534
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32535
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32536
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32537
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32604
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32605
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34148
Path Traversal(CWE-22) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Improper Authentication(CWE-287) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
No Mapping(CWE-noinfo) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367) https://cwe.mitre.org/data/definitions/367.html
Link Following(CWE-59) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Untrusted Search Path(CWE-426) https://cwe.mitre.org/data/definitions/426.html
Improper Privilege Management(CWE-269) https://cwe.mitre.org/data/definitions/269.html
SQL Injection(CWE-89) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Cross-site Scripting(CWE-79) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
No Mapping(CWE-Other) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html",
  "dc:date": "2024-05-23T15:23+09:00",
  "dcterms:issued": "2023-06-14T14:47+09:00",
  "dcterms:modified": "2024-05-23T15:23+09:00",
  "description": "Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:trendmicro:apex_central",
      "@product": "Apex Central",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:apex_one",
      "@product": "Apex One",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:mobile_security",
      "@product": "Trend Micro Mobile Security",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "9.8",
    "@severity": "Critical",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2023-002100",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU91852506/",
      "@id": "JVNVU#91852506",
      "@source": "JVN"
    },
    {
      "#text": "https://jvn.jp/en/vu/JVNVU93384719/index.html",
      "@id": "JVNVU#93384719",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32521",
      "@id": "CVE-2023-32521",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32522",
      "@id": "CVE-2023-32522",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32523",
      "@id": "CVE-2023-32523",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32524",
      "@id": "CVE-2023-32524",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32525",
      "@id": "CVE-2023-32525",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32526",
      "@id": "CVE-2023-32526",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32527",
      "@id": "CVE-2023-32527",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32528",
      "@id": "CVE-2023-32528",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-30902",
      "@id": "CVE-2023-30902",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32552",
      "@id": "CVE-2023-32552",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32553",
      "@id": "CVE-2023-32553",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32554",
      "@id": "CVE-2023-32554",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32555",
      "@id": "CVE-2023-32555",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32556",
      "@id": "CVE-2023-32556",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32557",
      "@id": "CVE-2023-32557",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34144",
      "@id": "CVE-2023-34144",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34145",
      "@id": "CVE-2023-34145",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34146",
      "@id": "CVE-2023-34146",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34147",
      "@id": "CVE-2023-34147",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34148",
      "@id": "CVE-2023-34148",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32529",
      "@id": "CVE-2023-32529",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32530",
      "@id": "CVE-2023-32530",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32531",
      "@id": "CVE-2023-32531",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32532",
      "@id": "CVE-2023-32532",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32533",
      "@id": "CVE-2023-32533",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32534",
      "@id": "CVE-2023-32534",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32535",
      "@id": "CVE-2023-32535",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32536",
      "@id": "CVE-2023-32536",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32537",
      "@id": "CVE-2023-32537",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32604",
      "@id": "CVE-2023-32604",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32605",
      "@id": "CVE-2023-32605",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-30902",
      "@id": "CVE-2023-30902",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32521",
      "@id": "CVE-2023-32521",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32522",
      "@id": "CVE-2023-32522",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32523",
      "@id": "CVE-2023-32523",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32524",
      "@id": "CVE-2023-32524",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32525",
      "@id": "CVE-2023-32525",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32526",
      "@id": "CVE-2023-32526",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32527",
      "@id": "CVE-2023-32527",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32528",
      "@id": "CVE-2023-32528",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32552",
      "@id": "CVE-2023-32552",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32553",
      "@id": "CVE-2023-32553",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32554",
      "@id": "CVE-2023-32554",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32555",
      "@id": "CVE-2023-32555",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32556",
      "@id": "CVE-2023-32556",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32557",
      "@id": "CVE-2023-32557",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34144",
      "@id": "CVE-2023-34144",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34145",
      "@id": "CVE-2023-34145",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34146",
      "@id": "CVE-2023-34146",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34147",
      "@id": "CVE-2023-34147",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32529",
      "@id": "CVE-2023-32529",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32530",
      "@id": "CVE-2023-32530",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32531",
      "@id": "CVE-2023-32531",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32532",
      "@id": "CVE-2023-32532",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32533",
      "@id": "CVE-2023-32533",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32534",
      "@id": "CVE-2023-32534",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32535",
      "@id": "CVE-2023-32535",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32536",
      "@id": "CVE-2023-32536",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32537",
      "@id": "CVE-2023-32537",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32604",
      "@id": "CVE-2023-32604",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32605",
      "@id": "CVE-2023-32605",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34148",
      "@id": "CVE-2023-34148",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-22",
      "@title": "Path Traversal(CWE-22)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-287",
      "@title": "Improper Authentication(CWE-287)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/367.html",
      "@id": "CWE-367",
      "@title": "Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-59",
      "@title": "Link Following(CWE-59)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/426.html",
      "@id": "CWE-426",
      "@title": "Untrusted Search Path(CWE-426)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/269.html",
      "@id": "CWE-269",
      "@title": "Improper Privilege Management(CWE-269)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-89",
      "@title": "SQL Injection(CWE-89)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Security updates for multiple Trend Micro products for enterprises (June 2023)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.