Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-32458

Опубликовано: 27 мая 2021
Источник: nvd
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:trendmicro:home_network_security:*:*:*:en:*:*:*:*
Версия до 6.6.604 (включая)
cpe:2.3:a:trendmicro:home_network_security:*:*:*:ja:*:*:*:*
Версия до 6.6.604 (включая)
cpe:2.3:a:trendmicro:home_network_security:*:*:*:zh:*:*:*:*
Версия до 6.6.604 (включая)

EPSS

Процентиль: 22%
0.00073
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-787

Связанные уязвимости

github
больше 3 лет назад

A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to code execution. An attacker can issue an ioctl to trigger this vulnerability.

EPSS

Процентиль: 22%
0.00073
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-787