Описание
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
Ссылки
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.6.604 (включая)
cpe:2.3:a:trendmicro:home_network_security:*:*:*:*:*:*:*:*
EPSS
Процентиль: 34%
0.00137
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to trigger this vulnerability.
EPSS
Процентиль: 34%
0.00137
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-787