Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-6339Improper Privilege Management in Interscan WEB Security Virtual Appliance

Severity
6.5MEDIUMNVD
EPSS
2.7%
top 14.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 5
Latest updateMay 13

Description

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to complete a secure passage for HTTPS connections. It also allows administrators to upload their own certificates signed by a root CA. An attacker with low privileges can download the current CA certificate

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8jrh-xx3q-344c: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 62022-05-13
CVEList
CVE-2017-6339: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 62017-04-05

💥Exploits & PoCs

1
Exploit-DB
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities2017-01-12
CVE-2017-6339 — Improper Privilege Management | cvebase