Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/tmka-19062 | Vendor Advisory |
https://helpcenter.trendmicro.com/en-us/article/tmka-19062 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpcenter.trendmicro.com/en-us/article/tmka-19062 - Vendor Advisory |
07 Jul 2023, 14:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Trendmicro maximum Security 2021
Trendmicro internet Security 2022 Trendmicro antivirus\+ Security 2022 Trendmicro antivirus\+ Security 2021 Trendmicro maximum Security 2023 Trendmicro internet Security 2023 Trendmicro antivirus\+ Security 2023 Trendmicro Microsoft Trendmicro premium Security 2023 Trendmicro maximum Security 2022 Trendmicro premium Security 2022 Microsoft windows Trendmicro premium Security 2021 Trendmicro internet Security 2021 |
|
CPE | cpe:2.3:a:trendmicro:internet_security_2023:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:antivirus\+_security_2022:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:premium_security_2022:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:internet_security_2022:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:antivirus\+_security_2023:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:antivirus\+_security_2021:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:premium_security_2021:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:maximum_security_2022:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:maximum_security_2023:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:internet_security_2021:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:premium_security_2023:*:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:maximum_security_2021:*:*:*:*:*:*:*:* |
|
CWE | CWE-427 | |
References | (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-19062 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
26 Jun 2023, 22:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-26 22:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-28929
Mitre link : CVE-2023-28929
CVE.ORG link : CVE-2023-28929
JSON object : View
Products Affected
trendmicro
- premium_security_2022
- antivirus\+_security_2023
- internet_security_2022
- internet_security_2023
- internet_security_2021
- maximum_security_2021
- premium_security_2021
- antivirus\+_security_2022
- premium_security_2023
- maximum_security_2023
- antivirus\+_security_2021
- maximum_security_2022
microsoft
- windows
CWE
CWE-427
Uncontrolled Search Path Element