First published: Thu Aug 27 2020(Updated: )
A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code execution.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
trendmicro deep security manager | =10.0 | |
trendmicro deep security manager | =11.0 | |
trendmicro deep security manager | =12.0 | |
Trend Micro Vulnerability Protection | =2.0-sp2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8602 has a high severity rating due to its potential for remote code execution.
To fix CVE-2020-8602, update to the latest versions of Trend Micro Deep Security or Vulnerability Protection as recommended by Trend Micro.
CVE-2020-8602 affects users of Trend Micro Deep Security versions 10.0 to 12.0 and Trend Micro Vulnerability Protection version 2.0 SP2.
CVE-2020-8602 allows authenticated attackers with full control privileges to bypass file integrity checks.
Attackers can potentially achieve remote code execution through the exploitation of CVE-2020-8602.