Trendmicro Deep Security vulnerabilities
7 known vulnerabilities affecting trendmicro/deep_security.
Total CVEs
7
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2023-52338HIGHCVSS 7.8v20.02024-01-23
CVE-2023-52338 [HIGH] CWE-59 CVE-2023-52338: A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - End
A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerab
nvd
CVE-2023-52337HIGHCVSS 7.8v20.02024-01-23
CVE-2023-52337 [HIGH] CWE-269 CVE-2023-52337: An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One
An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this v
nvd
CVE-2021-25252MEDIUMCVSS 5.5v10.0v11.0+2 more2021-03-03
CVE-2021-25252 [MEDIUM] CWE-400 CVE-2021-25252: Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a me
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
nvd
CVE-2020-8607MEDIUMCVSS 6.7v9.6v10.0+2 more2020-08-05
CVE-2020-8607 [MEDIUM] CWE-20 CVE-2020-8607: An input validation vulnerability found in multiple Trend Micro products utilizing a particular vers
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker
nvd
CVE-2019-15627HIGHCVSS 7.1PoCv10.0v11.0+1 more2019-10-17
CVE-2019-15627 [HIGH] CWE-59 CVE-2019-15627: Versions 10.0, 11.0 and 12.0 of the Trend Micro Deep Security Agent are vulnerable to an arbitrary f
Versions 10.0, 11.0 and 12.0 of the Trend Micro Deep Security Agent are vulnerable to an arbitrary file delete attack, which may lead to availability impact. Local OS access is required. Please note that only Windows agents are affected.
nvd
CVE-2019-15626HIGHCVSS 7.5v10.0v11.0+1 more2019-10-17
CVE-2019-15626 [HIGH] CWE-319 CVE-2019-15626: The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain w
The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain way, may transmit initial LDAP communication in clear text. This may result in confidentiality impact but does not impact integrity or availability.
nvd
CVE-2018-6218HIGHCVSS 7.0v10.0v10.12018-02-16
CVE-2018-6218 [HIGH] CWE-426 CVE-2018-6218: A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacke
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
nvd