This vulnerability allows remote attackers to bypass web filtering on affected installations of Trend Micro Antivirus for Mac. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the KERedirect module. The issue results from the improper filtering of HTTP requests. An attacker can leverage this vulnerability to bypass the protection offered by the product.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-11046 is considered high due to its potential to allow remote attackers to bypass web filtering.
To fix ZDI-CAN-11046, ensure you update your Trend Micro Antivirus for Mac to the latest version released by Trend Micro.
The risks associated with ZDI-CAN-11046 include unauthorized access to malicious content and the possibility of further exploitation if web filtering is bypassed.
Yes, user interaction is required to exploit ZDI-CAN-11046, as the target must visit a malicious page or open a malicious file.
ZDI-CAN-11046 affects various versions of Trend Micro Antivirus for Mac that have not been updated to a secure release.