First published: Fri Jul 06 2018(Updated: )
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus + Security | <=12.0.1191 | |
Trend Micro Internet Security 2023 | <=12.0.1191 | |
Trend Micro Maximum Security 2022 | <=12.0.1191 | |
Trend Micro Premium Security 2020 | <=12.0.1191 | |
Microsoft Windows | ||
Trend Micro OfficeScan | =11.0 | |
Trend Micro OfficeScan | =12.0 | |
Trend Micro OfficeScan | =11.0 | |
Trend Micro OfficeScan | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2018-3608 is a security flaw in Trend Micro Maximum Security (Consumer) 2018 (versions 12.0.1191 and below) that allows an attacker to inject malicious code into other processes.
Versions 12.0.1191 and below of Trend Micro Maximum Security, Trendmicro Internet Security, Trendmicro Premium Security, Trendmicro Officescan, and Trendmicro Officescan Monthly are affected by CVE-2018-3608.
CVE-2018-3608 has a severity level of 9.8 (Critical).
An attacker can exploit CVE-2018-3608 by creating a specially crafted packet that alters a vulnerable system and injects malicious code into other processes.
You can find more information about CVE-2018-3608 on the following pages: [Trend Micro Support](http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx) and [Trend Micro Technical Support](https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx).