A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt | Exploit Third Party Advisory |
https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124099.aspx | Vendor Advisory |
https://seclists.org/bugtraq/2020/Jan/28 | Exploit Issue Tracking Mailing List Third Party Advisory |
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt | Exploit Third Party Advisory |
https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124099.aspx | Vendor Advisory |
https://seclists.org/bugtraq/2020/Jan/28 | Exploit Issue Tracking Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt - Exploit, Third Party Advisory | |
References | () https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124099.aspx - Vendor Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/28 - Exploit, Issue Tracking, Mailing List, Third Party Advisory |
Information
Published : 2020-01-18 00:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20357
Mitre link : CVE-2019-20357
CVE.ORG link : CVE-2019-20357
JSON object : View
Products Affected
trendmicro
- premium_security_2020
- maximum_security_2020
- internet_security_2019
- internet_security_2020
- antivirus_\+_security_2020
- premium_security_2019
- maximum_security_2019
- antivirus_\+_security_2019
microsoft
- windows
CWE
CWE-428
Unquoted Search Path or Element