Description
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-7589 | An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device. |
References
| Link | Providers |
|---|---|
| https://helpcenter.trendmicro.com/en-us/article/TMKA-09644 |
|
History
No history.
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-04T13:22:29.985Z
Reserved: 2020-07-07T00:00:00.000Z
Link: CVE-2020-15602
No data.
Status : Modified
Published: 2020-07-15T20:15:13.443
Modified: 2024-11-21T05:05:50.460
Link: CVE-2020-15602
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD