An attacker must first obtain physical access to the target system in order to exploit this vulnerability. It is also important to note that the contents of the drive(s) encrypted with TMEE FDE would still be protected and would NOT be accessible by the attacker by exploitation of this vulnerability alone.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-31730 | A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows� Secure Boot process in an attempt to execute other attacks to obtain access to the contents of the device. An attacker must first obtain physical access to the target system in order to exploit this vulnerability. It is also important to note that the contents of the drive(s) encrypted with TMEE FDE would still be protected and would NOT be accessible by the attacker by exploitation of this vulnerability alone. |
| Link | Providers |
|---|---|
| https://success.trendmicro.com/solution/000292473 |
|
Mon, 05 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-05-05T16:02:55.834Z
Reserved: 2023-03-09T22:34:57.194Z
Link: CVE-2023-28005
Updated: 2024-08-02T12:23:30.818Z
Status : Modified
Published: 2023-03-22T06:15:10.877
Modified: 2025-05-05T16:15:33.057
Link: CVE-2023-28005
No data.
OpenCVE Enrichment
No data.
EUVD