Bulletin Date: October 13, 2020
Assigned CVEs: CVE-2020-27013
CVSSv3 Score: 4.4
Severity Rating: Medium
The Trend Micro Antivirus for Mac 2020 consumer family of products has released an update via ActiveUpdate to address a symbolic link privilege escalation vulnerability.
|Antivirus for Mac||2020 (v10.x) and below||macOS||English|
|Antivirus for Mac||2021 (v11)||macOS||English|
|Antivirus for Mac||2020 (v10.5) 10.5.1623 via ActiveUpdate||macOS||English|
|Antivirus for Mac||2020 (v10.0) 10.0.1803 via ActiveUpdate||macOS||English|
Trend Micro has addressed this vulnerability on the 2020 family of products (version 10.x) via patches that are available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Antivirus for Mac listed above. Customers who have at least version 10.0 will already have the necessary patch applied. Customers who have version 9.0 and below are recommended to install the latest version (v11) to address the issue.
The latest versions of Trend Micro Antivirus for Mac can be found here.
Trend Micro Antivirus for Mac 2020 (Consumer) contains a vulnerability in the product that occurs when a webserver is started that implements an API with several properties that can be read and written to allowing the attacker to gather and modify sensitive product and user data.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- Cees Elzinga from Danish Cyber Defence working with Trend Micro’s Zero Day Initiative
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.