This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the KERedirect kext. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-1285 is considered critical due to its potential for privilege escalation.
To fix ZDI-20-1285, ensure that you are using the latest version of Trend Micro Antivirus for Mac, which includes the necessary patches.
ZDI-20-1285 affects installations of Trend Micro Antivirus for Mac.
No, ZDI-20-1285 requires local access to the system to exploit the vulnerability.
Users of Trend Micro Antivirus for Mac are at risk if they do not update their software.