First published: Wed Feb 10 2021(Updated: )
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Antivirus\+ Security 2020 | =16.0 | |
Trendmicro Antivirus\+ Security 2021 | =17.0 | |
Trendmicro Internet Security 2020 | =16.0 | |
Trendmicro Internet Security 2021 | =17.0 | |
Trendmicro Maximum Security 2020 | =16.0 | |
Trend Micro Maximum Security | =17.0 | |
Trendmicro Premium Security 2020 | =16.0 | |
Trendmicro Premium Security 2021 | =17.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25251 is a code injection vulnerability in Trend Micro Security 2020 and 2021 families of consumer products.
To exploit CVE-2021-25251, an attacker must already have administrator privileges on the machine and can disable the program's password protection and disable protection.
Trendmicro Antivirus+ Security 2020, Trendmicro Antivirus+ Security 2021, Trendmicro Internet Security 2020, Trendmicro Internet Security 2021, Trendmicro Maximum Security 2020, Trend Micro Maximum Security, Trendmicro Premium Security 2020, and Trendmicro Premium Security 2021 are affected by CVE-2021-25251.
The severity of CVE-2021-25251 is high with a CVSS score of 7.2.
To fix CVE-2021-25251, update your Trend Micro Security product to the latest version available.