Input Validation Vulnerability in Trend Micro Rootkit Protection Driver
CVE-2020-8607
Key Information:
- Vendor
- Trend Micro
- Status
- Vendor
- CVE Published:
- 5 August 2020
Summary
An input validation issue present in various Trend Micro products utilizing a specific version of the rootkit protection driver can potentially be exploited by an attacker with administrative privileges. This flaw allows unauthorized modification of kernel addresses, which may lead to system instability, crashes, or even execution of arbitrary code at the kernel level. The attacker must have already gained administrator access to the affected machine prior to exploitation, emphasizing the need for robust security measures to prevent initial unauthorized access.
Affected Version(s)
Trend Micro Anti-Threat Toolkit (ATTK) 1.62.1240 and below
Trend Micro Apex One 2019 (On premise), SaaS
Trend Micro Deep Security 12.x, 11.x. 10.x
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved