An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administrator privileges on the target machine in order to exploit the vulnerability.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt | Exploit Third Party Advisory |
https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124090.aspx | Vendor Advisory |
https://seclists.org/bugtraq/2020/Jan/29 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-01-17 16:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-19697
Mitre link : CVE-2019-19697
JSON object : View
CWE
Products Affected
trendmicro
- premium_security_2019
- maximum_security_2019
- antivirus_\+_security_2019
- internet_security_2019
microsoft
- windows