Vulnerability Details CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.2%
CVSS Severity
CVSS v3 Score 6.7
CVSS v2 Score 7.2
Products affected by CVE-2020-8607
-
cpe:2.3:a:trendmicro:antivirus_toolkit:-
-
cpe:2.3:a:trendmicro:apex_one:2019
-
cpe:2.3:a:trendmicro:apex_one:saas
-
cpe:2.3:a:trendmicro:deep_security:10.0
-
cpe:2.3:a:trendmicro:deep_security:11.0
-
cpe:2.3:a:trendmicro:deep_security:12.0
-
cpe:2.3:a:trendmicro:deep_security:9.6
-
cpe:2.3:a:trendmicro:officescan:xg
-
cpe:2.3:a:trendmicro:officescan_business_security:10.0
-
cpe:2.3:a:trendmicro:officescan_business_security:9.0
-
cpe:2.3:a:trendmicro:officescan_business_security:9.5
-
cpe:2.3:a:trendmicro:officescan_business_security_service:-
-
cpe:2.3:a:trendmicro:officescan_cloud:15
-
cpe:2.3:a:trendmicro:officescan_cloud:16.0
-
cpe:2.3:a:trendmicro:online_scan:8.0
-
cpe:2.3:a:trendmicro:portable_security:2.0
-
cpe:2.3:a:trendmicro:portable_security:3.0
-
cpe:2.3:a:trendmicro:rootkit_buster:2.2
-
cpe:2.3:a:trendmicro:safe_lock:-
-
cpe:2.3:a:trendmicro:safe_lock:2.0
-
cpe:2.3:a:trendmicro:serverprotect:5.8
-
cpe:2.3:a:trendmicro:serverprotect:6.0
-
cpe:2.3:o:microsoft:windows:-