Vulnerability Description
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Home Network Security | <= 6.6.604 |
Related Weaknesses (CWE)
References
- https://helpcenter.trendmicro.com/en-us/article/TMKA-10337Vendor Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230ExploitThird Party Advisory
- https://helpcenter.trendmicro.com/en-us/article/TMKA-10337Vendor Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230ExploitThird Party Advisory
FAQ
What is CVE-2021-32457?
CVE-2021-32457 is a vulnerability with a CVSS score of 7.8 (HIGH). Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to es...
How severe is CVE-2021-32457?
CVE-2021-32457 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32457?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Home Network Security.