Lucene search

K
cve[email protected]CVE-2020-8607
HistoryAug 05, 2020 - 2:15 p.m.

CVE-2020-8607

2020-08-0514:15:13
CWE-20
web.nvd.nist.gov
16
cve-2020-8607
input validation
vulnerability
trend micro
rootkit protection
administrator permissions
kernel mode
code execution

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

Affected configurations

NVD
Node
microsoftwindowsMatch-
AND
trendmicroantivirus_toolkitRange<1.62.1240
OR
trendmicroapex_oneMatch2019
OR
trendmicroapex_oneMatchsaas
OR
trendmicrodeep_securityMatch9.6
OR
trendmicrodeep_securityMatch10.0
OR
trendmicrodeep_securityMatch11.0
OR
trendmicrodeep_securityMatch12.0
OR
trendmicroofficescanMatchxgsp1
OR
trendmicroofficescan_business_securityMatch9.0
OR
trendmicroofficescan_business_securityMatch9.5
OR
trendmicroofficescan_business_securityMatch10.0sp1
OR
trendmicroofficescan_business_security_serviceMatch-
OR
trendmicroofficescan_cloudMatch15
OR
trendmicroofficescan_cloudMatch16.0
OR
trendmicroonline_scanMatch8.0
OR
trendmicroportable_securityMatch2.0
OR
trendmicroportable_securityMatch3.0
OR
trendmicrorootkit_busterMatch2.2
OR
trendmicrosafe_lockMatch-txone
OR
trendmicrosafe_lockMatch2.0sp1-
OR
trendmicroserverprotectMatch5.8emc
OR
trendmicroserverprotectMatch5.8netware
OR
trendmicroserverprotectMatch5.8windows
OR
trendmicroserverprotectMatch6.0storage

CNA Affected

[
  {
    "product": "Trend Micro Apex One",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "2019 (On premise), SaaS"
      }
    ]
  },
  {
    "product": "Trend Micro OfficeScan",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "XG SP1"
      }
    ]
  },
  {
    "product": "Trend Micro Deep Security",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "12.x, 11.x. 10.x"
      }
    ]
  },
  {
    "product": "Trend Micro Worry-Free Business Security",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "10.0 SP1, Services (SaaS)"
      }
    ]
  },
  {
    "product": "Trend Micro Security (Consumer Family)",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "2020 (v16), 2019 (v15)"
      }
    ]
  },
  {
    "product": "Trend Micro Safe Lock",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "2.0 SP1, TXOne Ed"
      }
    ]
  },
  {
    "product": "Trend Micro ServerProtect",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8"
      }
    ]
  },
  {
    "product": "Trend Micro Portable Security",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "3.x, 2.x"
      }
    ]
  },
  {
    "product": "Trend Micro HouseCall",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "8.0"
      }
    ]
  },
  {
    "product": "Trend Micro Anti-Threat Toolkit (ATTK)",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "1.62.1240 and below"
      }
    ]
  },
  {
    "product": "Trend Micro Rootkit Buster",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "2.2"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Related for CVE-2020-8607