Trend Micro Security vulnerabilities

29 known vulnerabilities affecting trend_micro/trend_micro_security.

Total CVEs
29
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH21MEDIUM7

Vulnerabilities

Page 1 of 2
CVE-2022-34893HIGHCVSS 7.8v2022 (17.7.1179 and below)2022-09-19
CVE-2022-34893 [HIGH] CWE-59 CVE-2022-34893: Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower privileges could manipulate a mountpoint which could lead to escalation of privilege on an affected machine.
cvelistv5nvd
CVE-2022-37348MEDIUMCVSS 5.5v2022 (17.7.1383 and below)2022-09-19
CVE-2022-37348 [MEDIUM] CVE-2022-37348: Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-
cvelistv5
CVE-2022-37347MEDIUMCVSS 5.5v2022 (17.7.1383 and below)2022-09-19
CVE-2022-37347 [MEDIUM] CWE-125 CVE-2022-37347: Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Dis Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-35234.
cvelistv5nvd
CVE-2022-35234HIGHCVSS 7.1v2022 (17.7.1383 and below)2022-07-30
CVE-2022-35234 [HIGH] CWE-125 CVE-2022-35234: Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Dis Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine.
cvelistv5nvd
CVE-2022-30703HIGHCVSS 7.8v2022 (17.7.1383 and below)2022-06-09
CVE-2022-30703 [HIGH] CVE-2022-30703: Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerabi Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerability that could allow an attacker to obtain access to leaked kernel addresses and disclose sensitive information. This vulnerability could also potentially be chained for privilege escalation.
cvelistv5nvd
CVE-2022-30702MEDIUMCVSS 5.5v2022 (17.7.1130 and below)2022-06-09
CVE-2022-30702 [MEDIUM] CWE-125 CVE-2022-30702: Trend Micro Security 2022 and 2021 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Dis Trend Micro Security 2022 and 2021 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure vulnerability that could allow an attacker to disclose sensitive information on an affected machine.
cvelistv5nvd
CVE-2021-44023HIGHCVSS 7.1v2021 (v17)2021-12-16
CVE-2021-44023 [HIGH] CWE-59 CVE-2021-44023: A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 f A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
cvelistv5nvd
CVE-2021-36744HIGHCVSS 7.8v2019, 2020, 20212021-09-06
CVE-2021-36744 [HIGH] CWE-59 CVE-2021-36744: Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability w Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an attacker to exploit the system to escalate privileges and create a denial of service.
cvelistv5nvd
CVE-2021-25251HIGHCVSS 7.2v2020 (v16), 2021 (v17)2021-02-10
CVE-2021-25251 [HIGH] CWE-94 CVE-2021-25251: The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code inject The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
cvelistv5nvd
CVE-2020-27697HIGHCVSS 7.8v2020 (v16)2020-11-18
CVE-2020-27697 [HIGH] CWE-59 CVE-2020-27697: Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
cvelistv5nvd
CVE-2020-27695HIGHCVSS 7.8v2020 (v16)2020-11-18
CVE-2020-27695 [HIGH] CWE-426 CVE-2020-27695: Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
cvelistv5nvd
CVE-2020-27696HIGHCVSS 7.8v2020 (v16)2020-11-18
CVE-2020-27696 [HIGH] CVE-2020-27696: Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
cvelistv5nvd
CVE-2020-25775MEDIUMCVSS 6.3v2020 (v16)2020-09-29
CVE-2020-25775 [MEDIUM] CWE-362 CVE-2020-25775: The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race con The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.
cvelistv5nvd
CVE-2020-15604HIGHCVSS 7.5v2019 (v15)2020-09-24
CVE-2020-15604 [HIGH] CWE-295 CVE-2020-15604: An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v1 An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified.
cvelistv5nvd
CVE-2020-24560HIGHCVSS 7.5v2019 (v15)2020-09-24
CVE-2020-24560 [HIGH] CWE-295 CVE-2020-24560: An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v1 An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-295: Improper server certificate verification in th
cvelistv5nvd
CVE-2020-8607MEDIUMCVSS 6.7v2020 (v16), 2019 (v15)2020-08-05
CVE-2020-8607 [MEDIUM] CWE-20 CVE-2020-8607: An input validation vulnerability found in multiple Trend Micro products utilizing a particular vers An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker
cvelistv5nvd
CVE-2020-15603HIGHCVSS 7.5v2020 (v16)2020-07-15
CVE-2020-15603 [HIGH] CWE-125 CVE-2020-15603: An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an attacker to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential system crash.
cvelistv5nvd
CVE-2020-15602HIGHCVSS 7.8v2020 (v16)2020-07-15
CVE-2020-15602 [HIGH] CWE-426 CVE-2020-15602: An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 ( An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the sam
cvelistv5nvd
CVE-2019-19694MEDIUMCVSS 4.7v2019 (v15.0.0.1163 and below)2020-02-20
CVE-2019-19694 [MEDIUM] CVE-2019-19694: The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the entire product completely..
cvelistv5nvd
CVE-2019-20357HIGHCVSS 7.8PoCv2019 (v15) and 2020 (v16)2020-01-18
CVE-2019-20357 [HIGH] CWE-428 CVE-2019-20357: A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 an A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
cvelistv5nvd