Vulnerabilities > CVE-2019-19697 - Unspecified vulnerability in Trendmicro products
Attack vector
LOCAL Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administrator privileges on the target machine in order to exploit the vulnerability.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
OS | 1 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/155992/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt |
id | PACKETSTORM:155992 |
last seen | 2020-01-17 |
published | 2020-01-17 |
reporter | hyp3rlinx |
source | https://packetstormsecurity.com/files/155992/Trend-Micro-Security-2019-Security-Bypass-Protected-Service-Tampering.html |
title | Trend Micro Security 2019 Security Bypass Protected Service Tampering |
References
- http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt
- http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt
- https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124090.aspx
- https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124090.aspx
- https://seclists.org/bugtraq/2020/Jan/29
- https://seclists.org/bugtraq/2020/Jan/29