First published: Fri May 25 2018(Updated: )
An Out-of-Bounds write privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Maximum Security | ||
Trend Micro Maximum Security | <=12.0 | |
Trendmicro Internet Security | <=12.0 | |
Trendmicro Maximum Security | <=12.0 | |
Trendmicro Premium Security | <=12.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2018-6235.
Trend Micro Maximum Security versions up to and including 12.0 are affected by this vulnerability.
Attackers must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The severity of CVE-2018-6235 is high, with a CVSS score of 7.8.
You can fix this vulnerability by updating your installation of Trend Micro Maximum Security to the latest version available.