First published: Wed Oct 14 2020(Updated: )
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the iCoreService endpoint, which listens on local TCP port 37848 by default. The issue results from improper access control. An attacker can leverage this vulnerability to disclose information in the context of root.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Antivirus | =2020 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27013 is a vulnerability that allows local attackers to disclose sensitive information on affected installations of Trend Micro Antivirus for Mac.
CVE-2020-27013 affects Trend Micro Antivirus for Mac by allowing local attackers to disclose sensitive information.
The severity of CVE-2020-27013 is medium, with a CVSS score of 4.4.
CVE-2020-27013 can be exploited by first obtaining the ability to execute low-privileged code on the target system.
To fix CVE-2020-27013 in Trend Micro Antivirus for Mac, it is recommended to update to the latest version provided by the vendor.