An incorrect permission vulnerability in the product installer folders for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-475/ | Third Party Advisory VDB Entry |
https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-475/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-21-475/ - Third Party Advisory, VDB Entry |
Information
Published : 2021-05-12 15:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31519
Mitre link : CVE-2021-31519
CVE.ORG link : CVE-2021-31519
JSON object : View
Products Affected
trendmicro
- housecall_for_home_networks
microsoft
- windows
CWE
CWE-276
Incorrect Default Permissions