Bulletin Date: March 01, 2021
CVE Vulnerability Identifiers: CVE-2021-25227 (related)
CVSSv3 Score: 3.3: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Severity Rating: Low
Trend Micro has released a hotfix for the Trend Micro Security 2021 family of consumer products which resolves memory exhaustion Denial-Of-Service vulnerability.
|Trend Micro Security||2021 (v17)||Windows||English|
|Trend Micro Security||2020 (v16)||Windows||English|
|Trend Micro Security||2019 (v15)||Windows||English|
Trend Micro has released a hotfix available for each version below that resolves the issue.
|Trend Micro Security||2021 (v17) Hotfix||Windows||English|
|Trend Micro Security||2020 (v16) Hotfix||Windows||English|
|Trend Micro Security||2020 (v15) Hotfix||Windows||English|
Trend Micro Security 2021 (Consumer) is vulnerable to a memory exhaustion vulnerability that could lead to disabling all the scanning functionality within the application.
Note: An attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability – i.e. the attacker must already have access to the target system (either legitimately or via another exploit).
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- Michael DePlante of Trend Micro’s Zero Day Initiative
- Trend Micro Internal Research
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.