Published:2020/08/05  Last Updated:2020/08/05

JVNVU#99160193
Trend Micro anti-rootkit driver improperly validates inputs

Overview

Trend Micro anti-rootkit driver, which is used in various Trend Micro products, is vulnerable to improper input validation.

Products Affected

Trend Micro products containing the anti-rootkit driver.

Please refer to the list of affected products provided by Trend Micro.

Description

Trend Micro anti-rootkit driver, which is used in various Trend Micro products, is vulnerable to improper input validation (CWE-1285).

Impact

When an administrative-privilege user exploits this vulnerability, the system may be crashed or an arbitrary code may be executed in kernel mode.

Solution

Update the software
Update to the latest version or apply the appropriate patches to the affected products based on the information provided by the developer.

Apply Workaround
Do not assign administrative-privilege to untrusted users.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score: 6.7
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2020-8607
JVN iPedia