CVE-2021-32457

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:home_network_security:*:*:*:*:*:*:*:*

History

03 Jun 2022, 19:42

Type Values Removed Values Added
CPE cpe:2.3:a:trendmicro:home_network_security:6.1.567:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:home_network_security:*:*:*:*:*:*:*:*
References (MISC) https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 - (MISC) https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 - Vendor Advisory
CWE CWE-787

03 May 2022, 16:04

Type Values Removed Values Added
CWE CWE-269 CWE-787

03 Jun 2021, 15:15

Type Values Removed Values Added
Summary A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to trigger this vulnerability. Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
References
  • {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1230', 'name': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1230', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) https://helpcenter.trendmicro.com/en-us/article/TMKA-10337 -

01 Jun 2021, 19:09

Type Values Removed Values Added
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230 - (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230 - Exploit, Third Party Advisory
References (MISC) https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1230 - (MISC) https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1230 - Exploit, Third Party Advisory
CPE cpe:2.3:a:trendmicro:home_network_security:6.1.567:*:*:*:*:*:*:*
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8

26 May 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-26 14:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-32457

Mitre link : CVE-2021-32457

CVE.ORG link : CVE-2021-32457


JSON object : View

Products Affected

trendmicro

  • home_network_security
CWE
CWE-787

Out-of-bounds Write