CVE-2020-8607
Severity
6.7MEDIUM
EPSS
0.1%
top 75.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 5
Latest updateMay 24
Description
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vu…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9
Affected Packages22 packages
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-cjwf-2r6c-6h5f: An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could↗2022-05-24
CVEList▶
CVE-2020-8607: An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could↗2020-08-05