CVE-2021-36745

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication mechanisms in Trend Micro ServerProtect products, potentially gaining unauthorized access to security management functions. Affected installations include ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows/Novell Netware 5.8.

💻 Affected Systems

Products:
  • Trend Micro ServerProtect for Storage
  • Trend Micro ServerProtect for EMC Celerra
  • Trend Micro ServerProtect for Network Appliance Filers
  • Trend Micro ServerProtect for Microsoft Windows / Novell Netware
Versions: 6.0, 5.8
Operating Systems: Windows, Novell Netware, Various storage appliance platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability affects the management interface authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ServerProtect management console, allowing attackers to disable security protections, exfiltrate sensitive data, or deploy ransomware across protected storage systems.

🟠

Likely Case

Unauthorized access to security management functions, enabling attackers to disable antivirus scanning, modify security policies, or gain persistence on protected systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to ServerProtect management interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows authentication bypass without credentials, making exploitation straightforward for attackers who can reach the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest versions as specified in vendor advisories

Vendor Advisory: https://success.trendmicro.com/solution/000289038

Restart Required: Yes

Instructions:

1. Review Trend Micro advisory 000289038. 2. Download appropriate patches from Trend Micro support portal. 3. Apply patches to all affected ServerProtect installations. 4. Restart ServerProtect services. 5. Verify successful patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to ServerProtect management interfaces to trusted administrative networks only

Firewall Rules

all

Implement firewall rules to block external access to ServerProtect management ports

🧯 If You Can't Patch

  • Isolate ServerProtect management interfaces from untrusted networks using network segmentation
  • Implement strict access controls and monitoring for ServerProtect management console access

🔍 How to Verify

Check if Vulnerable:

Check ServerProtect version against affected versions (6.0, 5.8) in the management console or installation directory

Check Version:

Check ServerProtect management console 'About' section or installation properties

Verify Fix Applied:

Verify version has been updated beyond vulnerable versions and test authentication mechanisms

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unauthorized access to ServerProtect management functions
  • Authentication bypass patterns in access logs

Network Indicators:

  • Unusual traffic patterns to ServerProtect management ports from unauthorized sources
  • Authentication bypass attempts on management interfaces

SIEM Query:

source="ServerProtect" AND (event_type="authentication" AND result="success" AND source_ip NOT IN [admin_networks])

🔗 References

📤 Share & Export