Release Date: August 14, 2019

CVE Vulnerability Identifier(s): CVE-2019-14686

Platform: Windows

CVSS 3.0 Score: 5.4

Severity Rating: Medium


Trend Micro has released a new build for Trend Micro Security 2019 (version 15.0) family of consumer products which resolve a DLL hijacking vulnerability in the Folder Shield feature of the product.

In addition, the same vulnerability exists in the standalone Trend Micro Ransom Buster tool which is based on the same code but been officially retired and is no longer publicly available or supported.

Affected versions

Product Affected Versions Platform Language(s)
Premium Security 2019 (v15) Microsoft Windows English
Maximum Security
2019 (v15)
Microsoft Windows English
Internet Security
2019 (v15)
Microsoft Windows English
Antivirus + Security
2019 (v15)
Microsoft Windows English
Ransom Buster v1.0 Microsoft Windows English


Product Updated Build Platform Language(s)
Trend Micro Security 2019 15.0.1163 Microsoft Windows English
Ransom Buster Retired (EOL) Microsoft Windows English

Trend Micro has addressed these vulnerabilities in Trend Micro Security 2019 via a patch that is available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Security 2019 (version 15) listed above.

The vulnerability is not being addressed in the standalone Ransom Buster tool since it has been officially retired as mentioned above.

Vulnerability Details:

This patch includes mitigation for the following vulnerabilities:

  • CVE-2019-14686: A DLL hijacking vulnerability exists in the Trend Micro Security 2019 Folder Shield component and the standalone Trend Micro Ransom Buster tool in which, if exploited, would allow an attacker to load a malicious DLL, leading to elevated privileges.

Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.

Mitigating Factors

Exploiting these types of vulnerabilities require that an attacker has access (physical or remote) to a vulnerable machine.

Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to upgrade to the latest build as soon as possible.


Trend Micro would like to thank the following individuals and/or organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:

  • Attila Marosi-Bauer of Hacktivity Lab
Add a comment