Description
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Published: 2020-08-05
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-29455 An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
History

No history.

Subscriptions

Microsoft Windows
Trendmicro Antivirus Toolkit Apex One Deep Security Officescan Officescan Business Security Officescan Business Security Service Officescan Cloud Online Scan Portable Security Rootkit Buster Safe Lock Serverprotect
cve-icon MITRE

Status: PUBLISHED

Assigner: trendmicro

Published:

Updated: 2024-08-04T10:03:46.363Z

Reserved: 2020-02-04T00:00:00.000Z

Link: CVE-2020-8607

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-05T14:15:13.530

Modified: 2024-11-21T05:39:07.050

Link: CVE-2020-8607

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses