Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://jvn.jp/en/jp/JVN60093979/", "name": "https://jvn.jp/en/jp/JVN60093979/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://jvn.jp/jp/JVN60093979/", "name": "https://jvn.jp/jp/JVN60093979/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890", "name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673", "name": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673", "tags": ["Vendor Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-295"}, {"lang": "en", "value": "CWE-494"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2020-15604", "ASSIGNER": "security@trendmicro.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2020-09-24T02:15Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:trendmicro:antivirus\\+_2019:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "15.0"}, {"cpe23Uri": "cpe:2.3:a:trendmicro:internet_security_2019:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "15.0"}, {"cpe23Uri": "cpe:2.3:a:trendmicro:maximum_security_2019:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "15.0"}, {"cpe23Uri": "cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:trendmicro:premium_security_2019:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "15.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-07-21T11:39Z"}