CVE-2021-28649

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:housecall_for_home_networks:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 - Vendor Advisory () https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-21-474/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-21-474/ - Third Party Advisory, VDB Entry

21 May 2021, 18:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.4
v3 : 7.3
CWE CWE-276
References (N/A) https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 - (N/A) https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 - Vendor Advisory
References (N/A) https://www.zerodayinitiative.com/advisories/ZDI-21-474/ - (N/A) https://www.zerodayinitiative.com/advisories/ZDI-21-474/ - Third Party Advisory, VDB Entry
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:housecall_for_home_networks:*:*:*:*:*:*:*:*

Information

Published : 2021-05-12 15:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-28649

Mitre link : CVE-2021-28649

CVE.ORG link : CVE-2021-28649


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • housecall_for_home_networks
CWE
CWE-276

Incorrect Default Permissions