This vulnerability allows remote attackers to bypass web filtering on affected installations of Trend Micro Antivirus for Mac. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the KERedirect module. The issue results from the improper filtering of HTTP requests. An attacker can leverage this vulnerability to bypass the protection offered by the product.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-1242 is classified as high due to its potential for remote exploitation.
To fix ZDI-20-1242, ensure you have the latest updates installed for Trend Micro Antivirus for Mac.
ZDI-20-1242 can be exploited by remote attackers through web filtering bypass after user interaction.
ZDI-20-1242 affects specific earlier versions of Trend Micro Antivirus for Mac that lack the security update.
Yes, user interaction is required for the exploitation of ZDI-20-1242 as the target must visit a malicious page or open a malicious file.