Vulnerability Description
A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x22205C by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Antivirus\+ | <= 12.0 |
| Trendmicro | Internet Security | <= 12.0 |
| Trendmicro | Maximum Security | <= 12.0 |
| Trendmicro | Premium Security | <= 12.0 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://esupport.trendmicro.com/en-us/home/pages/technical-support/1119591.aspxMitigationVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-18-266/Third Party AdvisoryVDB Entry
- https://esupport.trendmicro.com/en-us/home/pages/technical-support/1119591.aspxMitigationVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-18-266/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-6232?
CVE-2018-6232 is a vulnerability with a CVSS score of 7.8 (HIGH). A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw withi...
How severe is CVE-2018-6232?
CVE-2018-6232 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6232?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Antivirus\+, Trendmicro Internet Security, Trendmicro Maximum Security, Trendmicro Premium Security, Microsoft Windows.