7.2

CVE-2021-25251

The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.

Data is provided by the National Vulnerability Database (NVD)
TrendmicroAntivirus+ Security 2020 Version16.0
   MicrosoftWindows Version-
TrendmicroAntivirus+ Security 2021 Version17.0
   MicrosoftWindows Version-
TrendmicroInternet Security 2020 Version16.0
   MicrosoftWindows Version-
TrendmicroInternet Security 2021 Version17.0
   MicrosoftWindows Version-
TrendmicroMaximum Security 2020 Version16.0
   MicrosoftWindows Version-
TrendmicroMaximum Security 2021 Version17.0
   MicrosoftWindows Version-
TrendmicroPremium Security 2020 Version16.0
   MicrosoftWindows Version-
TrendmicroPremium Security 2021 Version17.0
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.86% 0.73
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.