CVE-2020-8607

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:2.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:3.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:rootkit_buster:2.2:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:safe_lock:-:*:*:*:txone:*:*:*
cpe:2.3:a:trendmicro:safe_lock:2.0:sp1:*:*:-:*:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*
cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*
cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-08-05 14:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-8607

Mitre link : CVE-2020-8607

CVE.ORG link : CVE-2020-8607


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • antivirus_toolkit
  • officescan_business_security
  • officescan
  • deep_security
  • safe_lock
  • rootkit_buster
  • apex_one
  • officescan_cloud
  • serverprotect
  • officescan_business_security_service
  • portable_security
  • online_scan
CWE
CWE-20

Improper Input Validation