Vulnerability Description
An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Antivirus \+ Security | <= 12.0 |
| Trendmicro | Internet Security | <= 12.0 |
| Trendmicro | Maximum Security | <= 12.0 |
| Trendmicro | Premium Security | <= 12.0 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120742.aspxVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-18-963/Third Party AdvisoryVDB Entry
- https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120742.aspxVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-18-963/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-15363?
CVE-2018-15363 is a vulnerability with a CVSS score of 7.8 (HIGH). An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker m...
How severe is CVE-2018-15363?
CVE-2018-15363 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-15363?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Antivirus \+ Security, Trendmicro Internet Security, Trendmicro Maximum Security, Trendmicro Premium Security, Microsoft Windows.