CVE-2023-28929
Severity CVSS v4.0:
Pending analysis
Type:
CWE-427
Uncontrolled Search Path Element
Publication date:
26/06/2023
Last modified:
07/07/2023
Description
Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:trendmicro:antivirus\+_security_2021:*:*:*:*:*:*:*:* | 17.0.1412 (including) | |
cpe:2.3:a:trendmicro:internet_security_2021:*:*:*:*:*:*:*:* | 17.0.1412 (including) | |
cpe:2.3:a:trendmicro:maximum_security_2021:*:*:*:*:*:*:*:* | 17.0.1412 (including) | |
cpe:2.3:a:trendmicro:premium_security_2021:*:*:*:*:*:*:*:* | 17.0.1412 (including) | |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:trendmicro:antivirus\+_security_2022:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:internet_security_2022:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:maximum_security_2022:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:premium_security_2022:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:trendmicro:antivirus\+_security_2023:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:internet_security_2023:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:maximum_security_2023:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:a:trendmicro:premium_security_2023:*:*:*:*:*:*:*:* | 17.7.1476 (including) | |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page