From 4c4e953f23e1699a2aa23ebf5b7e9f86f49dfb42 Mon Sep 17 00:00:00 2001 From: jpattrendmicro Date: Wed, 5 Aug 2020 06:47:40 -0700 Subject: [PATCH] Trend Micro CVE-2020-8607 Trend Micro CVE-2020-8607 --- 2020/8xxx/CVE-2020-8607.json | 185 +++++++++++++++++++++++++++++++---- 1 file changed, 168 insertions(+), 17 deletions(-) diff --git a/2020/8xxx/CVE-2020-8607.json b/2020/8xxx/CVE-2020-8607.json index 89eba67ec1d..8b1ea316a3b 100644 --- a/2020/8xxx/CVE-2020-8607.json +++ b/2020/8xxx/CVE-2020-8607.json @@ -1,18 +1,169 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-8607", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta" : { + "ASSIGNER" : "security@trendmicro.com", + "ID" : "CVE-2020-8607", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Trend Micro Apex One", + "version" : { + "version_data" : [ + { + "version_value" : "2019 (On premise), SaaS" + } + ] + } + }, + { + "product_name" : "Trend Micro OfficeScan", + "version" : { + "version_data" : [ + { + "version_value" : "XG SP1" + } + ] + } + }, + { + "product_name" : "Trend Micro Deep Security", + "version" : { + "version_data" : [ + { + "version_value" : "12.x, 11.x. 10.x" + } + ] + } + }, + { + "product_name" : "Trend Micro Worry-Free Business Security", + "version" : { + "version_data" : [ + { + "version_value" : "10.0 SP1, Services (SaaS)" + } + ] + } + }, + { + "product_name" : "Trend Micro Security (Consumer Family)", + "version" : { + "version_data" : [ + { + "version_value" : "2020 (v16), 2019 (v15)" + } + ] + } + }, + { + "product_name" : "Trend Micro Safe Lock", + "version" : { + "version_data" : [ + { + "version_value" : "2.0 SP1, TXOne Ed" + } + ] + } + }, + { + "product_name" : "Trend Micro ServerProtect", + "version" : { + "version_data" : [ + { + "version_value" : "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8" + } + ] + } + }, + { + "product_name" : "Trend Micro Portable Security", + "version" : { + "version_data" : [ + { + "version_value" : "3.x, 2.x" + } + ] + } + }, + { + "product_name" : "Trend Micro HouseCall", + "version" : { + "version_data" : [ + { + "version_value" : "8.0" + } + ] + } + }, + { + "product_name" : "Trend Micro Anti-Threat Toolkit (ATTK)", + "version" : { + "version_data" : [ + { + "version_value" : "1.62.1240 and below" + } + ] + } + }, + { + "product_name" : "Trend Micro Rootkit Buster", + "version" : { + "version_data" : [ + { + "version_value" : "2.2" + } + ] + } + } + ] + }, + "vendor_name" : "Trend Micro" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode.\r\n\r\nAn attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Improper Input Validation" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://success.trendmicro.com/solution/000260713" + }, + { + "url" : "https://success.trendmicro.com/jp/solution/000260748" + }, + { + "url" : "https://jvn.jp/vu/JVNVU99160193/" + }, + { + "url" : "https://jvn.jp/en/vu/JVNVU99160193/index.html" + } + ] + } +}