Trend Micro InterScan Web Security Virtual Appliance (IWSVA) Multiple Vulnerabilities (000253095)

High Nessus Plugin ID 139030

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4


The remote host is running an application that is affected by multiple vulnerabilities.


The Trend Micro InterScan Web Security Virtual Appliance is affected by multiple vulnerabilities :

- A path traversal vulnerability exists in the Apache Solr application due to improper validation of a user-supplied path prior to using it in file operations when parsing the file parameter in an HTTP request. An unauthenticated, remote attacker (when combined with CVE-2020-8606) can exploit this, by sending a URI that contains path traversal characters, to disclose the contents of arbitrary files. (CVE-2020-8604)

- An authentication bypass vulnerability exists in the HTTP proxy service due to its ability to communicate with internal services on the same host. An unauthenticated, remote attacker can exploit this, by sending requests through the proxy, to access other services that are otherwise inaccessible. (CVE-2020-8606)

Note that the appliance is reportedly affected by other vulnerabilities; however, this plugin has not tested for those issues.


Upgrade to the IWSVA version 6.5 build 1901 or later.

See Also

Plugin Details

Severity: High

ID: 139030

File Name: trendmicro_iwsva_000253095.nasl

Version: 1.3

Type: remote

Family: Firewalls

Published: 2020/07/28

Updated: 2020/08/14

Dependencies: 10195, 139031

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS Score Source: CVE-2020-8606

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:trendmicro:interscan_web_security_virtual_appliance

Required KB Items: installed_sw/Trend Micro IWSVA Web UI

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2020/05/18

Vulnerability Publication Date: 2020/05/18

Exploitable With

Metasploit (Trend Micro Web Security (Virtual Appliance) Remote Code Execution)

Reference Information

CVE: CVE-2020-8604, CVE-2020-8606

ZDI: ZDI-20-677, ZDI-20-678