Описание
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- PatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Одновременно
Одно из
EPSS
6.7 Medium
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
EPSS
6.7 Medium
CVSS3
7.2 High
CVSS2