Lucene search

K
nvd[email protected]NVD:CVE-2023-28929
HistoryJun 26, 2023 - 10:15 p.m.

CVE-2023-28929

2023-06-2622:15:09
CWE-427
web.nvd.nist.gov
cve-2023-28929
trend micro security
consumer
dll hijacking
vulnerability
executable file
malicious program
persistence mechanism

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.1%

Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.

Affected configurations

NVD
Node
microsoftwindowsMatch-
AND
trendmicroantivirus\+_security_2021Range17.0.1412
OR
trendmicrointernet_security_2021Range17.0.1412
OR
trendmicromaximum_security_2021Range17.0.1412
OR
trendmicropremium_security_2021Range17.0.1412
Node
microsoftwindowsMatch-
AND
trendmicroantivirus\+_security_2022Range17.7.1476
OR
trendmicrointernet_security_2022Range17.7.1476
OR
trendmicromaximum_security_2022Range17.7.1476
OR
trendmicropremium_security_2022Range17.7.1476
Node
microsoftwindowsMatch-
AND
trendmicroantivirus\+_security_2023Range17.7.1476
OR
trendmicrointernet_security_2023Range17.7.1476
OR
trendmicromaximum_security_2023Range17.7.1476
OR
trendmicropremium_security_2023Range17.7.1476

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.1%

Related for NVD:CVE-2023-28929