Release Date: August 14, 2019
CVE Vulnerability Identifier(s): CVE-2019-14686
Platform: Windows
CVSS 3.0 Score: 5.4
Severity Rating: Medium
Summary
Trend Micro has released a new build for Trend Micro Security 2019 (version 15.0) family of consumer products which resolve a DLL hijacking vulnerability in the Folder Shield feature of the product.
In addition, the same vulnerability exists in the standalone Trend Micro Ransom Buster tool which is based on the same code but been officially retired and is no longer publicly available or supported.
Affected versions
Product | Affected Versions | Platform | Language(s) |
---|---|---|---|
Premium Security | 2019 (v15) | Microsoft Windows | English |
Maximum Security |
2019 (v15)
|
Microsoft Windows | English |
Internet Security |
2019 (v15)
|
Microsoft Windows | English |
Antivirus + Security |
2019 (v15)
|
Microsoft Windows | English |
Ransom Buster | v1.0 | Microsoft Windows | English |
Solution
Product | Updated Build | Platform | Language(s) |
---|---|---|---|
Trend Micro Security 2019 | 15.0.1163 | Microsoft Windows | English |
Ransom Buster | Retired (EOL) | Microsoft Windows | English |
Trend Micro has addressed these vulnerabilities in Trend Micro Security 2019 via a patch that is available now through the productβs automatic ActiveUpdate feature for all versions of Trend Micro Security 2019 (version 15) listed above.
The vulnerability is not being addressed in the standalone Ransom Buster tool since it has been officially retired as mentioned above.
Vulnerability Details:
This patch includes mitigation for the following vulnerabilities:
- CVE-2019-14686: A DLL hijacking vulnerability exists in the Trend Micro Security 2019 Folder Shield component and the standalone Trend Micro Ransom Buster tool in which, if exploited, would allow an attacker to load a malicious DLL, leading to elevated privileges.
Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.
Mitigating Factors
Exploiting these types of vulnerabilities require that an attacker has access (physical or remote) to a vulnerable machine.
Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to upgrade to the latest build as soon as possible.
Acknowledgement
Trend Micro would like to thank the following individuals and/or organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:
- Attila Marosi-Bauer of Hacktivity Lab