CVE-2020-8604
📋 TL;DR
CVE-2020-8604 is a path traversal vulnerability (CWE-22) in Trend Micro InterScan Web Security Virtual Appliance 6.5 that allows remote attackers to access sensitive files on affected installations. This can lead to information disclosure and potentially remote code execution. Organizations using Trend Micro InterScan Web Security Virtual Appliance 6.5 are affected.
💻 Affected Systems
- Trend Micro InterScan Web Security Virtual Appliance
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Sensitive information disclosure including configuration files, credentials, and system information that could enable further attacks.
If Mitigated
Limited impact with proper network segmentation, access controls, and monitoring in place.
🎯 Exploit Status
Multiple public exploit proofs exist, and the vulnerability can be exploited without authentication using simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply the patch referenced in Trend Micro advisory 000253095
Vendor Advisory: https://success.trendmicro.com/solution/000253095
Restart Required: Yes
Instructions:
1. Access the Trend Micro support portal. 2. Download the patch for InterScan Web Security Virtual Appliance 6.5. 3. Apply the patch following vendor instructions. 4. Restart the appliance as required.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to the appliance to only trusted IP addresses and networks.
Web Application Firewall Rules
allImplement WAF rules to block path traversal patterns and suspicious file access attempts.
🧯 If You Can't Patch
- Isolate the appliance in a dedicated network segment with strict access controls
- Implement comprehensive monitoring and alerting for suspicious file access patterns
🔍 How to Verify
Check if Vulnerable:
Check if you are running Trend Micro InterScan Web Security Virtual Appliance version 6.5 without the patch applied.
Check Version:
Check the appliance web interface or administrative console for version information.
Verify Fix Applied:
Verify the patch has been applied by checking the version and consulting the vendor advisory for specific fix verification steps.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in web server logs
- Requests containing path traversal sequences (../, ..\)
- Access to sensitive system files
Network Indicators:
- HTTP requests with path traversal payloads to the appliance
- Unusual outbound connections from the appliance
SIEM Query:
source="web_server_logs" AND (uri="*../*" OR uri="*..\*" OR uri="*/etc/*" OR uri="*/proc/*")
🔗 References
- http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html
- https://success.trendmicro.com/solution/000253095
- https://www.zerodayinitiative.com/advisories/ZDI-20-678/
- http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html
- https://success.trendmicro.com/solution/000253095
- https://www.zerodayinitiative.com/advisories/ZDI-20-678/