7
CVE-2019-14688
- EPSS 0.41%
- Veröffentlicht 20.02.2020 23:15:20
- Zuletzt bearbeitet 21.11.2024 04:27:08
- Quelle security@trendmicro.com
- Teams Watchlist Login
- Unerledigt Login
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trendmicro ≫ Control Manager Version7.0
Trendmicro ≫ Endpoint Sensor Version1.6
Trendmicro ≫ Im Security Version1.6.5
Trendmicro ≫ Mobile Security Version9.8 SwEditionenterprise
Trendmicro ≫ Officescan Versionxg
Trendmicro ≫ Scanmail Version14.0 SwPlatformmicrosoft_exchange
Trendmicro ≫ Security Version2019
Trendmicro ≫ Serverprotect Version5.8 SwPlatformemc
Trendmicro ≫ Serverprotect Version5.8 SwPlatformnetware
Trendmicro ≫ Serverprotect Version5.8 SwPlatformwindows
Trendmicro ≫ Serverprotect Version6.0 SwPlatformstorage
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.41% | 0.604 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7 | 1 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5.1 | 4.9 | 6.4 |
AV:N/AC:H/Au:N/C:P/I:P/A:P
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.