First published: Wed Nov 18 2020(Updated: )
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus+ Security 2020 | <=16.0 | |
Trend Micro Internet Security | <=16.0 | |
Trend Micro Maximum Security | <=16.0 | |
Trend Micro Premium Security 2020 | <=16.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27697 has been rated as a high severity vulnerability due to the potential for administrative privilege escalation.
To fix CVE-2020-27697, ensure that you apply the latest patches and updates provided by Trend Micro for the affected products.
CVE-2020-27697 affects Trend Micro Antivirus+ Security 2020, Trend Micro Internet Security 2020, Trend Micro Maximum Security 2020, and Trend Micro Premium Security 2020.
CVE-2020-27697 enables a symlink attack that can be exploited by placing a malicious DLL in a high-privilege non-protected location.
Exploiting CVE-2020-27697 can lead to unauthorized administrative access during the installation process, compromising system security.