5.5

CVE-2021-25252

Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TrendmicroApex Central Version2019 Update-
   MicrosoftWindows Version-
TrendmicroApex One Version2019 Update-
   MicrosoftWindows Version-
TrendmicroCloud Edge Version5.0
TrendmicroApex One Version- Update-
   ApplemacOS Version-
TrendmicroDeep Security Version10.0 Update-
TrendmicroDeep Security Version11.0 Update-
TrendmicroDeep Security Version12.0 Update-
TrendmicroDeep Security Version20.0 Update- SwEditionlong_term_support
TrendmicroControl Manager Version7.0 Update-
   MicrosoftWindows Version-
TrendmicroDeep Discovery Analyzer Version5.1 Update-
TrendmicroDeep Discovery Inspector Version3.8 Update-
TrendmicroOfficescan Version-
   MicrosoftWindows Version-
TrendmicroPortal Protect Version2.6
   MicrosoftWindows Version-
TrendmicroScanmail Version14.0 SwPlatformmicrosoft_exchange
   MicrosoftWindows Version-
TrendmicroScanmail For Ibm Domino Version5.8 Update-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
TrendmicroServerprotect For Storage Version6.0 Update-
   MicrosoftWindows Version-
TrendmicroServerprotect Version5.8 Update-
   EmcCelerra Network Attached Storage Version-
   MicrosoftWindows Version-
   NovellNetware Version-
TrendmicroSafe Lock Version1.1 Update- SwEditiontxone
   MicrosoftWindows Version-
TrendmicroWorry-free Business Security Version10.1 Update-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.166
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.