7.8

CVE-2023-28929

Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.

Data is provided by the National Vulnerability Database (NVD)
TrendmicroAntivirus+ Security 2021 Version <= 17.0.1412
   MicrosoftWindows Version-
TrendmicroInternet Security 2021 Version <= 17.0.1412
   MicrosoftWindows Version-
TrendmicroMaximum Security 2021 Version <= 17.0.1412
   MicrosoftWindows Version-
TrendmicroPremium Security 2021 Version <= 17.0.1412
   MicrosoftWindows Version-
TrendmicroAntivirus+ Security 2022 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroInternet Security 2022 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroMaximum Security 2022 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroPremium Security 2022 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroAntivirus+ Security 2023 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroInternet Security 2023 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroMaximum Security 2023 Version <= 17.7.1476
   MicrosoftWindows Version-
TrendmicroPremium Security 2023 Version <= 17.7.1476
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.135
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.