Описание
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.6.604 (включая)Версия до 6.6.604 (включая)Версия до 6.6.604 (включая)
Одно из
cpe:2.3:a:trendmicro:home_network_security:*:*:*:en:*:*:*:*
cpe:2.3:a:trendmicro:home_network_security:*:*:*:ja:*:*:*:*
cpe:2.3:a:trendmicro:home_network_security:*:*:*:zh:*:*:*:*
EPSS
Процентиль: 22%
0.00073
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787
Связанные уязвимости
github
больше 3 лет назад
A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to code execution. An attacker can issue an ioctl to trigger this vulnerability.
EPSS
Процентиль: 22%
0.00073
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787