Unknown
CVE-2020-8607
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-8607
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- antivirus toolkit,
- apex one 2019,
- apex one saas,
- deep security 10.0,
- deep security 11.0,
- deep security 12.0,
- deep security 9.6,
- officescan business security 10.0,
- officescan business security 9.0,
- officescan business security 9.5,
- officescan business security service -,
- officescan cloud 15,
- officescan cloud 16.0,
- officescan xg,
- online scan 8.0,
- portable security 2.0,
- portable security 3.0,
- rootkit buster 2.2,
- safe lock -,
- safe lock 2.0,
- serverprotect 5.8,
- serverprotect 6.0
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: