First published: Mon Dec 02 2019(Updated: )
Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
trendmicro antivirus \+ Security 2020 | <=16.0.1221 | |
Trend Micro Internet Security | <=16.0.1221 | |
Trend Micro Maximum Security | <=16.0.1221 | |
Trend Micro Premium Security 2020 | <=16.0.1221 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15628 has a medium severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2019-15628, upgrade Trend Micro Security (Consumer) to version 16.0.1222 or later.
CVE-2019-15628 affects Trend Micro Antivirus + Security, Trend Micro Internet Security, Trend Micro Maximum Security, and Trend Micro Premium Security 2020 versions 16.0.1221 and below.
CVE-2019-15628 is a DLL hijacking vulnerability that can be exploited to execute malicious programs.
CVE-2019-15628 requires local access to the system, so it is not typically considered a remote exploit.