CVE-2017-11394

CRITICAL

Trendmicro Officescan - Improper Input Validation

Title source: rule

Description

Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the T parameter within Proxy.php. Formerly ZDI-CAN-4544.

Exploits (2)

exploitdb WORKING POC
by Mehmet Ince · rubywebappsphp
https://www.exploit-db.com/exploits/42971
metasploit WORKING POC EXCELLENT
by mr_me <[email protected]>, Mehmet Ince <[email protected]> · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/trendmicro_officescan_widget_exec.rb

Scores

CVSS v3 9.8
EPSS 0.8067
EPSS Percentile 99.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-20
Status published
Products (3)
Trend Micro/Trend Micro OfficeScan 11, XG (12)
trendmicro/officescan 11.0 sp1
trendmicro/officescan 12.0
Published Aug 03, 2017
Tracked Since Feb 18, 2026