PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9316 Trendmicro CVE debrief

CVE-2016-9316 covers multiple stored cross-site scripting (XSS) flaws in Trend Micro InterScan Web Security Virtual Appliance (IWSVA). Authenticated remote users with least privileges could inject arbitrary HTML or JavaScript into web pages through the com.trend.iwss.gui.servlet.updateaccountadministration component. Trend Micro states the issue was resolved in Version 6.5 CP 1737.

Vendor
Trendmicro
Product
CVE-2016-9316
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-21
Original CVE updated
2026-05-13
Advisory published
2017-02-21
Advisory updated
2026-05-13

Who should care

Administrators and security teams running Trend Micro IWSVA 6.5-SP2_Build_Linux_1707 or earlier, especially environments where lower-privileged authenticated users can access administrative web functions.

Technical summary

NVD classifies the issue as CWE-79 (stored XSS) with CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerable condition affects the trendmicro:interscan_web_security_virtual_appliance product family up to version 6.5, and the affected servlet is com.trend.iwss.gui.servlet.updateaccountadministration. The impact is limited to confidentiality and integrity at low levels, but the scope change indicates injected content can affect other users or sessions that render the stored payload.

Defensive priority

Medium. This is an authenticated web application flaw rather than a pre-authentication remote code execution issue, but it can still enable account abuse, session manipulation, or malicious content delivery inside an administrative interface.

Recommended defensive actions

  • Upgrade to Trend Micro IWSVA Version 6.5 CP 1737 or later, as referenced by the vendor advisory.
  • Restrict access to administrative interfaces to trusted networks and least-privilege roles.
  • Review accounts with web administration access and remove unnecessary privileges.
  • Monitor administrative pages for unexpected stored content or suspicious HTML/JavaScript.
  • Use browser and web application protections where available, but do not rely on them as the primary remediation.

Evidence notes

The vulnerability description, affected component, and fixed version come from the NVD/CVE record and the Trend Micro vendor advisory reference. The CVE record lists stored XSS in com.trend.iwss.gui.servlet.updateaccountadministration, impact on authenticated least-privilege remote users, affected versions up to 6.5, and remediation in Version 6.5 CP 1737. NVD also classifies the weakness as CWE-79 and provides the CVSS v3.0 vector.

Official resources

CVE published 2017-02-21. No Known Exploited Vulnerabilities (KEV) listing was provided in the source corpus. The record was modified on 2026-05-13, but that date is metadata maintenance, not the original disclosure date.