Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "5225790C-66F3-438C-82A9-0567EA2D3EAE", "versionEndExcluding": "1.62.1240", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*", "matchCriteriaId": "0BD39638-1D52-4FA8-BBA0-305795D7D2E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A741097B-4B1F-4541-8E81-ABAAB16F4CCF", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC7B6BD-BAF1-4E0D-9BFB-6A9BE7D3AC40", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "81D6DD3F-6DA9-4D25-A0AB-8A2670A6FE91", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BDD405A-E3EA-48F8-AC3D-E45A666920C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*", "matchCriteriaId": "64600B42-4884-41F2-A683-AE1EDB79372E", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B20A7619-A7A7-4048-BF27-5B2613DCF914", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "14329F60-1C5D-4A4C-BBCA-BD42FFB4FB73", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "762313F8-2BA6-4ED7-A977-56C962D5B27F", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E3FC1CA-FFB4-4838-9BCE-BB5CAC28505F", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*", "matchCriteriaId": "7D4FDFB7-9F82-47F2-B265-916BFCE0A0EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "C23A004A-B597-402D-BFA8-9EB11580B13F", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "388766C0-6983-453A-A1C2-8266127337C3", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:portable_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D33BDD31-422F-4DB0-B2DC-789611260C35", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:portable_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "079E3712-9365-44F8-804B-2ADBD89C1D5D", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:rootkit_buster:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4AA0F265-BD68-41F7-99DD-8832EE7E295B", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:safe_lock:-:*:*:*:txone:*:*:*", "matchCriteriaId": "8549A2AA-5BDE-4B27-9861-9426769FAB0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:safe_lock:2.0:sp1:*:*:-:*:*:*", "matchCriteriaId": "9B28CE37-C436-4440-B43F-905482D91AD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", "matchCriteriaId": "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", "matchCriteriaId": "82D38D59-9208-4101-89D8-367E53DA29D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", "matchCriteriaId": "7293D7E6-196E-4C9F-B107-77FB2E770A1E", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", "matchCriteriaId": "46FD65C7-6DED-47CA-988D-089E95D2F7B5", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability."}, {"lang": "es", "value": "Una vulnerabilidad de comprobaci\u00f3n de entrada que se encuentra en varios productos de Trend Micro que usan una versi\u00f3n particular de un controlador de protecci\u00f3n de rootkit espec\u00edfico, podr\u00eda permitir a un atacante en modo usuario con permisos de administrador abusar del controlador para modificar una direcci\u00f3n del kernel que puede causar un bloqueo del sistema o potencialmente conllevar a una ejecuci\u00f3n de c\u00f3digo en modo kernel. Un atacante ya debe haber obtenido acceso de administrador en la m\u00e1quina de destino (leg\u00edtimamente o mediante un ataque no relacionado separado) para explotar esta vulnerabilidad"}], "id": "CVE-2020-8607", "lastModified": "2024-11-21T05:39:07.050", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-05T14:15:13.530", "references": [{"source": "security@trendmicro.com", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/vu/JVNVU99160193/index.html"}, {"source": "security@trendmicro.com", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/vu/JVNVU99160193/"}, {"source": "security@trendmicro.com", "tags": ["Vendor Advisory"], "url": "https://success.trendmicro.com/jp/solution/000260748"}, {"source": "security@trendmicro.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://success.trendmicro.com/solution/000260713"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/vu/JVNVU99160193/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/vu/JVNVU99160193/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://success.trendmicro.com/jp/solution/000260748"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://success.trendmicro.com/solution/000260713"}], "sourceIdentifier": "security@trendmicro.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}