Published:2016/09/16  Last Updated:2016/09/16

JVN#98126322
Trend Micro Internet Security vulnerability where files may be excluded as scan targets

Overview

Trend Micro Internet Security provided by Trend Micro Incorporated contains a vulnerability where arbitrary files or folders may be excluded as scan targets.

Products Affected

  • Trend Micro Internet Security 8
  • Trend Micro Internet Security 10

Description

Trend Micro Internet Security provided by Trend Micro Incorporated contains a vulnerability where arbitrary files or folders may be excluded as scan targets when the conditions below are met.

  • An attacker can place a specific file into the system
  • The attacker can execute a specific API from the specific file

Impact

An arbitrary file or folder may be excluded as scan targets. As a result, the product may not be able to detect behavior of an unauthorized program.

Solution

Upgrade the Software
According to the developer, Trend Micro Internet Security 11 is not affected by this vulnerability.
Upgrade to Trend Micro Internet Security 11 or later according to the information provided by the developer.

Apply the Update Module
Apply the Update Module according to the information provided by the developer.
According to the developer, the Update Module is applied automatically when the system connects to the Internet.
For information on how to apply the Update Module manually, or how to check whether the module has been applied, refer to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score: 4.7
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score: 2.6
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Trend Micro Incorporated coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2016-000166