First published: Wed May 12 2021(Updated: )
An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Housecall For Home Networks | <=5.3.1179 | |
Microsoft Windows | ||
Trend Micro HouseCall for Home Networks |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28649 has a medium severity rating due to the potential for privilege escalation.
To fix CVE-2021-28649, update Trend Micro HouseCall for Home Networks to version 5.3.1180 or later.
CVE-2021-28649 allows an attacker to escalate privileges and execute arbitrary code through improper permissions in the product installer.
CVE-2021-28649 affects versions of Trend Micro HouseCall for Home Networks up to and including 5.3.1179.
Users of Trend Micro HouseCall for Home Networks versions 5.3.1179 and below on Windows systems are affected by CVE-2021-28649.