Critical severity9.8NVD Advisory· Published Aug 27, 2008· Updated Apr 23, 2026
CVE-2008-2433
CVE-2008-2433
Description
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."
Affected products
4cpe:2.3:a:trendmicro:client_server_messaging_suite:3.5:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:trendmicro:client_server_messaging_suite:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:client_server_messaging_suite:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:worry-free_business_security:5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/31373nvdBroken LinkPatchVendor Advisory
- secunia.com/secunia_research/2008-31/advisory/nvdBroken LinkVendor Advisory
- www.securityfocus.com/archive/1/495670/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/30792nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txtnvdVendor Advisory
- www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txtnvdVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/44597nvdThird Party AdvisoryVDB Entry
- securityreason.com/securityalert/4191nvdBroken Link
- www.vupen.com/english/advisories/2008/2421nvdBroken Link
News mentions
0No linked articles in our index yet.