Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8607

Опубликовано: 05 авг. 2020
Источник: nvd
CVSS3: 6.7
CVSS2: 7.2
EPSS Низкий

Описание

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:*
Версия до 1.62.1240 (исключая)
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:2.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:3.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:rootkit_buster:2.2:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:safe_lock:-:*:*:*:txone:*:*:*
cpe:2.3:a:trendmicro:safe_lock:2.0:sp1:*:*:-:*:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*
cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 24%
0.00082
Низкий

6.7 Medium

CVSS3

7.2 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

github
больше 3 лет назад

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

EPSS

Процентиль: 24%
0.00082
Низкий

6.7 Medium

CVSS3

7.2 High

CVSS2

Дефекты

CWE-20