7.2

CVE-2020-8607

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

Data is provided by the National Vulnerability Database (NVD)
TrendmicroAntivirus Toolkit Version < 1.62.1240
   MicrosoftWindows Version-
TrendmicroApex One Version2019
   MicrosoftWindows Version-
TrendmicroApex One Versionsaas
   MicrosoftWindows Version-
TrendmicroDeep Security Version9.6
   MicrosoftWindows Version-
TrendmicroDeep Security Version10.0
   MicrosoftWindows Version-
TrendmicroDeep Security Version11.0
   MicrosoftWindows Version-
TrendmicroDeep Security Version12.0
   MicrosoftWindows Version-
TrendmicroOfficescan Versionxg Updatesp1
   MicrosoftWindows Version-
TrendmicroOfficescan Business Security Version9.0
   MicrosoftWindows Version-
TrendmicroOfficescan Business Security Version9.5
   MicrosoftWindows Version-
TrendmicroOfficescan Business Security Version10.0 Updatesp1
   MicrosoftWindows Version-
TrendmicroOfficescan Cloud Version15
   MicrosoftWindows Version-
TrendmicroOfficescan Cloud Version16.0
   MicrosoftWindows Version-
TrendmicroOnline Scan Version8.0
   MicrosoftWindows Version-
TrendmicroPortable Security Version2.0
   MicrosoftWindows Version-
TrendmicroPortable Security Version3.0
   MicrosoftWindows Version-
TrendmicroRootkit Buster Version2.2
   MicrosoftWindows Version-
TrendmicroSafe Lock Version- SwEditiontxone
   MicrosoftWindows Version-
TrendmicroSafe Lock Version2.0 Updatesp1 SwEdition-
   MicrosoftWindows Version-
TrendmicroServerprotect Version5.8 SwPlatformemc
   MicrosoftWindows Version-
TrendmicroServerprotect Version5.8 SwPlatformnetware
   MicrosoftWindows Version-
TrendmicroServerprotect Version5.8 SwPlatformwindows
   MicrosoftWindows Version-
TrendmicroServerprotect Version6.0 SwPlatformstorage
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.211
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.