Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 | Vendor Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 | Third Party Advisory | 
| https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 | Vendor Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 - Vendor Advisory | |
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 - Third Party Advisory | 
07 Jun 2021, 17:26
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:trendmicro:home_network_security:*:*:*:en:*:*:*:* cpe:2.3:a:trendmicro:home_network_security:*:*:*:ja:*:*:*:* cpe:2.3:a:trendmicro:home_network_security:*:*:*:zh:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : 5.5 v3 : 6.5 | 
| References | (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 - Third Party Advisory | |
| References | (MISC) https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 - Vendor Advisory | |
| CWE | CWE-798 | 
03 Jun 2021, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
| Summary | Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability. | 
27 May 2021, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-05-27 11:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32459
Mitre link : CVE-2021-32459
CVE.ORG link : CVE-2021-32459
JSON object : View
Products Affected
                trendmicro
- home_network_security
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
