CVE-2019-19697

An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administrator privileges on the target machine in order to exploit the vulnerability.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:antivirus_\+_security_2019:15.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:internet_security_2019:15.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:maximum_security_2019:15.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:premium_security_2019:15.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt - Exploit, Third Party Advisory () http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt - Exploit, Third Party Advisory
References () https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124090.aspx - Vendor Advisory () https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124090.aspx - Vendor Advisory
References () https://seclists.org/bugtraq/2020/Jan/29 - Exploit, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Jan/29 - Exploit, Mailing List, Third Party Advisory

Information

Published : 2020-01-18 00:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19697

Mitre link : CVE-2019-19697

CVE.ORG link : CVE-2019-19697


JSON object : View

Products Affected

trendmicro

  • antivirus_\+_security_2019
  • maximum_security_2019
  • premium_security_2019
  • internet_security_2019

microsoft

  • windows