Views:

Bulletin Date: July 15, 2020

Platform: Microsoft Windows

Assigned CVE: CVE-2020-15603

CVSSv3 Scores: 6.0 (Medium)

Summary

Trend Micro has released new builds of the Trend Micro Security 2020 consumer family of products that resolve an invalid memory read vulnerability in a Trend Micro Security driver.

Affected versions

Product Affected Versions Platform Language(s)
Premium Security 2020 (v16.0.1302 and below) Windows English
Maximum Security 2020 (v16.0.1302 and below) Windows English
Internet Security 2020 (v16.0.1302 and below) Windows English
Antivirus+ 2020 (v16.0.1302 and below) Windows English

Solution

Product Updated Build Platform Language(s)
All Trend Micro Security 2020 versions above v16.0.1370 Windows English


Trend Micro has addressed these vulnerabilities via a patch that is available now through the products' automatic ActiveUpdate feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update.

Customers who have not yet received the update can manually click "Update Now" to ensure they have the latest build. Customers who are still using Trend Micro Security 2019 (v15) and below can download Trend Micro Security 2020 (v16)here.

Vulnerability Details

An invalid memory read vulnerability in a Trend Micro Secuity (Consumer) 2020 driver could allow an attacker to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential system crash.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • Chris Sakuma and Peter Ferrie of Symantec, A Division of Broadcom

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

Comments (0)
Add a comment