PatchSiren cyber security CVE debrief
CVE-2016-9316 Trendmicro CVE debrief
CVE-2016-9316 covers multiple stored cross-site scripting (XSS) flaws in Trend Micro InterScan Web Security Virtual Appliance (IWSVA). Authenticated remote users with least privileges could inject arbitrary HTML or JavaScript into web pages through the com.trend.iwss.gui.servlet.updateaccountadministration component. Trend Micro states the issue was resolved in Version 6.5 CP 1737.
- Vendor
- Trendmicro
- Product
- CVE-2016-9316
- CVSS
- MEDIUM 5.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-21
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-21
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams running Trend Micro IWSVA 6.5-SP2_Build_Linux_1707 or earlier, especially environments where lower-privileged authenticated users can access administrative web functions.
Technical summary
NVD classifies the issue as CWE-79 (stored XSS) with CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerable condition affects the trendmicro:interscan_web_security_virtual_appliance product family up to version 6.5, and the affected servlet is com.trend.iwss.gui.servlet.updateaccountadministration. The impact is limited to confidentiality and integrity at low levels, but the scope change indicates injected content can affect other users or sessions that render the stored payload.
Defensive priority
Medium. This is an authenticated web application flaw rather than a pre-authentication remote code execution issue, but it can still enable account abuse, session manipulation, or malicious content delivery inside an administrative interface.
Recommended defensive actions
- Upgrade to Trend Micro IWSVA Version 6.5 CP 1737 or later, as referenced by the vendor advisory.
- Restrict access to administrative interfaces to trusted networks and least-privilege roles.
- Review accounts with web administration access and remove unnecessary privileges.
- Monitor administrative pages for unexpected stored content or suspicious HTML/JavaScript.
- Use browser and web application protections where available, but do not rely on them as the primary remediation.
Evidence notes
The vulnerability description, affected component, and fixed version come from the NVD/CVE record and the Trend Micro vendor advisory reference. The CVE record lists stored XSS in com.trend.iwss.gui.servlet.updateaccountadministration, impact on authenticated least-privilege remote users, affected versions up to 6.5, and remediation in Version 6.5 CP 1737. NVD also classifies the weakness as CWE-79 and provides the CVSS v3.0 vector.
Official resources
-
CVE-2016-9316 CVE record
CVE.org
-
CVE-2016-9316 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
CVE published 2017-02-21. No Known Exploited Vulnerabilities (KEV) listing was provided in the source corpus. The record was modified on 2026-05-13, but that date is metadata maintenance, not the original disclosure date.