High severity8.8NVD Advisory· Published Aug 3, 2017· Updated May 13, 2026
CVE-2017-11392
CVE-2017-11392
Description
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745.
Affected products
3cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:*:*:*:*:*:*:*
- Trend Micro/Trend Micro InterScan Messaging Security Virtual Appliancev5Range: 9.0,9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.zerodayinitiative.com/advisories/ZDI-17-504nvdThird Party AdvisoryVDB Entry
- success.trendmicro.com/solution/1117723nvdVendor Advisory
- www.securityfocus.com/bid/100075nvd
News mentions
0No linked articles in our index yet.