First published: Fri Jul 06 2018(Updated: )
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Antivirus \+ Security | <=12.0.1191 | |
Trendmicro Internet Security | <=12.0.1191 | |
Trendmicro Maximum Security | <=12.0.1191 | |
Trendmicro Premium Security | <=12.0.1191 | |
Microsoft Windows | ||
Trendmicro Officescan | =11.0 | |
Trendmicro Officescan | =12.0 | |
Trendmicro Officescan Monthly | =11.0 | |
Trendmicro Officescan Monthly | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2018-3608 is a security flaw in Trend Micro Maximum Security (Consumer) 2018 (versions 12.0.1191 and below) that allows an attacker to inject malicious code into other processes.
Versions 12.0.1191 and below of Trend Micro Maximum Security, Trendmicro Internet Security, Trendmicro Premium Security, Trendmicro Officescan, and Trendmicro Officescan Monthly are affected by CVE-2018-3608.
CVE-2018-3608 has a severity level of 9.8 (Critical).
An attacker can exploit CVE-2018-3608 by creating a specially crafted packet that alters a vulnerable system and injects malicious code into other processes.
You can find more information about CVE-2018-3608 on the following pages: [Trend Micro Support](http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx) and [Trend Micro Technical Support](https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx).