Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a specific kernel extension request attack where an attacker could bypass the Web Threat Protection feature of the product. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/TMKA-09947 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-1242/ | Third Party Advisory VDB Entry |
https://helpcenter.trendmicro.com/en-us/article/TMKA-09947 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-1242/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpcenter.trendmicro.com/en-us/article/TMKA-09947 - Patch, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-20-1242/ - Third Party Advisory, VDB Entry |
Information
Published : 2020-10-14 15:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25777
Mitre link : CVE-2020-25777
CVE.ORG link : CVE-2020-25777
JSON object : View
Products Affected
trendmicro
- antivirus
CWE