Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-15602

Опубликовано: 15 июл. 2020
Источник: nvd
CVSS3: 7.8
CVSS2: 6.9
EPSS Низкий

Описание

An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:trendmicro:antivirus\+_2020:*:*:*:*:*:*:*:*
Версия до 16.0.1146 (включая)
cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*
Версия до 16.0.1146 (включая)
cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*
Версия до 16.0.1146 (включая)
cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*
Версия до 16.0.1146 (включая)
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01406
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-426

Связанные уязвимости

github
больше 3 лет назад

An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.

EPSS

Процентиль: 80%
0.01406
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-426