Vulnerability Details : CVE-2020-15602
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.
Vulnerability category: File inclusionExecute code
Products affected by CVE-2020-15602
- cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:antivirus\+_2020:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15602
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15602
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-15602
-
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-15602
-
https://helpcenter.trendmicro.com/en-us/article/TMKA-09644
Security Bulletin: Untrusted Search Path RCE Vulnerability in Trend Micro Security 2020 (Consumer) · Trend Micro for HomeVendor Advisory
Jump to