CVE-2020-8607
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
05/08/2020
Last modified:
11/08/2020
Description
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:* | 1.62.1240 (excluding) | |
| cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



