An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Microsoft
Subscribe
|
Windows
Subscribe
|
|
Trendmicro
Subscribe
|
Antivirus Toolkit
Subscribe
Apex One
Subscribe
Deep Security
Subscribe
Officescan
Subscribe
Officescan Business Security
Subscribe
Officescan Business Security Service
Subscribe
Officescan Cloud
Subscribe
Online Scan
Subscribe
Portable Security
Subscribe
Rootkit Buster
Subscribe
Safe Lock
Subscribe
Serverprotect
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29455 | An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-04T10:03:46.363Z
Reserved: 2020-02-04T00:00:00
Link: CVE-2020-8607
No data.
Status : Modified
Published: 2020-08-05T14:15:13.530
Modified: 2024-11-21T05:39:07.050
Link: CVE-2020-8607
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD