Description
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29455 | An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability. |
References
History
No history.
Subscriptions
Microsoft
Subscribe
Windows
Subscribe
Trendmicro
Subscribe
Antivirus Toolkit
Subscribe
Apex One
Subscribe
Deep Security
Subscribe
Officescan
Subscribe
Officescan Business Security
Subscribe
Officescan Business Security Service
Subscribe
Officescan Cloud
Subscribe
Online Scan
Subscribe
Portable Security
Subscribe
Rootkit Buster
Subscribe
Safe Lock
Subscribe
Serverprotect
Subscribe
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-04T10:03:46.363Z
Reserved: 2020-02-04T00:00:00.000Z
Link: CVE-2020-8607
No data.
Status : Modified
Published: 2020-08-05T14:15:13.530
Modified: 2024-11-21T05:39:07.050
Link: CVE-2020-8607
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD