CVE-2021-36741

An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
OR cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*

History

26 Feb 2025, 06:28

Type Values Removed Values Added
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.

12 Feb 2025, 19:23

Type Values Removed Values Added
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability.

21 Nov 2024, 06:13

Type Values Removed Values Added
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.
References () https://success.trendmicro.com/jp/solution/000287796 - Broken Link, Vendor Advisory () https://success.trendmicro.com/jp/solution/000287796 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/jp/solution/000287815 - Broken Link, Vendor Advisory () https://success.trendmicro.com/jp/solution/000287815 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/solution/000287819 - Broken Link, Vendor Advisory () https://success.trendmicro.com/solution/000287819 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/solution/000287820 - Broken Link, Vendor Advisory () https://success.trendmicro.com/solution/000287820 - Broken Link, Vendor Advisory

14 Aug 2024, 15:14

Type Values Removed Values Added
CWE CWE-20 CWE-434
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability.

04 Aug 2024, 01:15

Type Values Removed Values Added
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.
Summary (es) Una vulnerabilidad de comprobación de entrada inapropiada en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security versión 10.0 SP1, permite a un adjunto remoto cargar archivos arbitrarios en las instalaciones afectadas. Nota: un atacante debe obtener primero la habilidad de iniciar sesión en la consola de administración del producto para poder explotar esta vulnerabilidad (es) Una vulnerabilidad de validación de entrada incorrecta en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security 10.0 SP1 permite que un control remoto conectado cargue archivos arbitrarios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de iniciar sesión en la consola de administración del producto para poder aprovechar esta vulnerabilidad.

26 Jul 2024, 19:26

Type Values Removed Values Added
References () https://success.trendmicro.com/jp/solution/000287796 - Vendor Advisory () https://success.trendmicro.com/jp/solution/000287796 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/jp/solution/000287815 - Vendor Advisory () https://success.trendmicro.com/jp/solution/000287815 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/solution/000287819 - Vendor Advisory () https://success.trendmicro.com/solution/000287819 - Broken Link, Vendor Advisory
References () https://success.trendmicro.com/solution/000287820 - Vendor Advisory () https://success.trendmicro.com/solution/000287820 - Broken Link, Vendor Advisory
Summary (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability. (en) An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability.

06 Aug 2021, 17:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
References (N/A) https://success.trendmicro.com/solution/000287820 - (N/A) https://success.trendmicro.com/solution/000287820 - Vendor Advisory
References (N/A) https://success.trendmicro.com/jp/solution/000287796 - (N/A) https://success.trendmicro.com/jp/solution/000287796 - Vendor Advisory
References (N/A) https://success.trendmicro.com/jp/solution/000287815 - (N/A) https://success.trendmicro.com/jp/solution/000287815 - Vendor Advisory
References (N/A) https://success.trendmicro.com/solution/000287819 - (N/A) https://success.trendmicro.com/solution/000287819 - Vendor Advisory
CWE CWE-20

30 Jul 2021, 15:15

Type Values Removed Values Added
Summary An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product’s management console in order to exploit this vulnerability. An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability.

29 Jul 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-29 20:15

Updated : 2025-03-13 16:33


NVD link : CVE-2021-36741

Mitre link : CVE-2021-36741

CVE.ORG link : CVE-2021-36741


JSON object : View

Products Affected

trendmicro

  • officescan_business_security
  • officescan
  • worry-free_business_security
  • apex_one

microsoft

  • windows
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type