641
VMScore

CVE-2020-8607

Published: 05/08/2020 Updated: 11/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trendmicro antivirus_toolkit

trendmicro apex_one 2019

trendmicro apex_one saas

trendmicro deep_security 9.6

trendmicro deep_security 10.0

trendmicro deep_security 11.0

trendmicro deep_security 12.0

trendmicro officescan xg

trendmicro officescan_business_security 9.0

trendmicro officescan_business_security 9.5

trendmicro officescan_business_security 10.0

trendmicro officescan_business_security_service -

trendmicro officescan_cloud 15

trendmicro officescan_cloud 16.0

trendmicro online_scan 8.0

trendmicro portable_security 2.0

trendmicro portable_security 3.0

trendmicro rootkit_buster 2.2

trendmicro safe_lock -

trendmicro safe_lock 2.0

trendmicro serverprotect 5.8

trendmicro serverprotect 6.0