First published: Wed May 26 2021(Updated: )
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Home Network Security | <=6.6.604 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32457 is rated as a critical vulnerability due to the potential for privilege escalation on affected devices.
To mitigate CVE-2021-32457, users should update their Trend Micro Home Network Security device to the latest version that is not vulnerable.
CVE-2021-32457 affects Trend Micro Home Network Security versions 6.6.604 and earlier.
CVE-2021-32457 is classified as a stack-based buffer overflow vulnerability.
An attacker could escalate privileges on affected devices by issuing a specially crafted iotcl command.