First published: Fri Feb 16 2018(Updated: )
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Deep Security | =10.0 | |
Trendmicro Deep Security | =10.1 | |
Trendmicro Endpoint Sensor | =1.6 | |
Trendmicro Officescan | =11.0 | |
Trendmicro Officescan | =12.0 | |
Trendmicro Security | =12.0 | |
Trendmicro Worry-free Business Security | =9.5 | |
Trendmicro Worry-free Business Security | =9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6218 is a DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) that could allow an attacker to run arbitrary code on a vulnerable system.
CVE-2018-6218 affects Trend Micro's Deep Security version 10.0 and 10.1.
CVE-2018-6218 affects Trend Micro's Endpoint Sensor version 1.6.
CVE-2018-6218 affects Trend Micro's Officescan versions 11.0 and 12.0.
CVE-2018-6218 affects Trend Micro's Security version 12.0.
CVE-2018-6218 affects Trend Micro's Worry-free Business Security version 9.5 (both Advanced and Standard editions).
CVE-2018-6218 has a severity rating of 7 (High).
To fix CVE-2018-6218, it is recommended to apply the relevant security patches or updates provided by Trend Micro.
You can find more information about CVE-2018-6218 on the following references: SecurityFocus (http://www.securityfocus.com/bid/103096), JVN (https://jvn.jp/jp/JVN28865183/), and Trend Micro's solution (https://success.trendmicro.com/jp/solution/1119348).
CVE-2018-6218 is classified under CWE-426 (Untrusted Search Path).