Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-ANTI-THREAT-TOOLKIT-(ATTK)-REMOTE-CODE-EXECUTION.txt | Third Party Advisory |
https://success.trendmicro.com/solution/000149878 | Vendor Advisory |
https://seclists.org/bugtraq/2019/Oct/30 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Oct/42 | Exploit Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2020/Jan/55 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/156160/TrendMicro-Anti-Threat-Toolkit-Improper-Fix.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jan/50 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-10-21 12:15
Updated : 2022-01-01 12:11
NVD link : CVE-2019-9491
Mitre link : CVE-2019-9491
JSON object : View
CWE
CWE-427
Uncontrolled Search Path Element
Products Affected
microsoft
- windows
trendmicro
- anti-threat_toolkit