First published: Thu Dec 16 2021(Updated: )
A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Antivirus\+ Security 2021 | <=17.0 | |
Trendmicro Internet Security 2021 | <=17.0 | |
Trend Micro Maximum Security | <=17.0 | |
Trendmicro Premium Security 2021 | <=17.0 | |
Microsoft Windows | ||
Trend Micro Maximum Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-44023.
The title of this vulnerability is Trend Micro Maximum Security Link Following Denial-of-Service Vulnerability.
The severity of CVE-2021-44023 is high with a CVSS score of 7.1.
CVE-2021-44023 affects Trendmicro Antivirus+ Security 2021, Trendmicro Internet Security 2021, Trend Micro Maximum Security, and Trendmicro Premium Security 2021 up to version 17.0.
This vulnerability can be exploited by local attackers with the ability to execute low-privileged code on the target system.
No, Microsoft Windows is not vulnerable to CVE-2021-44023.
You can find more information about this vulnerability at the following references: https://helpcenter.trendmicro.com/en-us/article/tmka-10867 and https://www.zerodayinitiative.com/advisories/ZDI-21-1536/
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-59.