CVE-2020-8607

Severity
6.7MEDIUM
EPSS
0.1%
top 75.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5
Latest updateMay 24

Description

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages22 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cjwf-2r6c-6h5f: An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could2022-05-24
CVEList
CVE-2020-8607: An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could2020-08-05

💬Community

1
Bugzilla
CVE-2019-8607 webkitgtk: Out-of-bounds read leading to memory disclosure2020-09-08
CVE-2020-8607 (MEDIUM CVSS 6.7) | An input validation vulnerability f | cvebase.io