Security vendor Trend Micro has once again found itself patching its own software vulnerabilities.
An attacker on a local network could exploit the vulnerability by sending a malformed network packet targeting ServerProtect's 'StCommon.dll' component.
Once the exploit has been successfully launched, an attacker could remotely execute code on the compromised server.
Trend Micro has issued a fix for the Windows version of the vulnerability in the support section of its website. The EMC and NetApp versions will not be patched until 19 and 29 March respectively, the company said.
Security firm Secunia noted that the attack had to be carried out on a local network, and rated the vulnerability as 'moderately critical' despite the possibility for remote code execution.
Secunia recommends that users install the patches as soon as they are available.
This is the second time in two weeks that Trend Micro, which makes its money plugging others' security holes, has had to patch vulnerabilities in its own software.
Earlier this month, the company issued a patch for a vulnerability that affected more than 30 of its security products.
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago