Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-0686

CWE-3994 documents4 sources
Severity
7.2HIGH
EPSS
0.1%
top 69.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 1
Latest updateMay 2

Description

The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-gfhg-7w8w-j26f: The TrendMicro Activity Monitor Module (tmactmon2022-05-02
CVEList
CVE-2009-0686: The TrendMicro Activity Monitor Module (tmactmon2009-04-01

💥Exploits & PoCs

1
Exploit-DB
Trend Micro Internet Security Pro 2009 - Priviliege Escalation2009-03-30
CVE-2009-0686 (HIGH CVSS 7.2) | The TrendMicro Activity Monitor Mod | cvebase.io