CVE-2020-8607
05.08.2020, 14:15
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
trendmicro | antivirus_toolkit | 𝑥 < 1.62.1240 |
trendmicro | deep_security | 9.6 |
trendmicro | deep_security | 10.0 |
trendmicro | deep_security | 11.0 |
trendmicro | deep_security | 12.0 |
trendmicro | officescan_business_security | 9.0 |
trendmicro | officescan_business_security | 9.5 |
trendmicro | officescan_business_security | 10.0:sp1 |
trendmicro | officescan_business_security_service | - |
trendmicro | officescan_cloud | 16.0 |
trendmicro | online_scan | 8.0 |
trendmicro | portable_security | 2.0 |
trendmicro | portable_security | 3.0 |
trendmicro | rootkit_buster | 2.2 |
trendmicro | safe_lock | - |
trendmicro | safe_lock | 2.0:sp1 |
trendmicro | serverprotect | 5.8 |
trendmicro | serverprotect | 5.8 |
trendmicro | serverprotect | 5.8 |
trendmicro | serverprotect | 6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References