First published: Mon Jan 29 2024(Updated: )
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Trend Micro Antivirus + Security | <6.0.2103 | |
Trend Micro Antivirus + Security | <6.0.2103 | |
Trend Micro Internet Security 2023 | <6.0.2103 | |
Trend Micro Maximum Security 2022 | <6.0.2103 | |
Trend Micro Premium Security 2020 | <6.0.2103 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23940 is rated as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2024-23940, users should update Trend Micro uiAirSupport to version 6.0.2103 or later.
CVE-2024-23940 affects multiple Trend Micro products including Antivirus + Security, Internet Security, Maximum Security, and Premium Security versions below 6.0.2103.
CVE-2024-23940 is a DLL hijacking/proxying vulnerability allowing code execution.
Yes, exploitation of CVE-2024-23940 could potentially allow an attacker to compromise sensitive data on the system.