Release Date: November 25, 2019
CVE Vulnerability Identifiers: CVE-2019-15628
CVSS 3.0 Scores: 4.0
Severity Ratings: Medium
Trend Micro has released a new build for the Trend Micro Security 2020 (version 16.0) family of consumer products which resolve a DLL hijacking vulnerability.
|Premium Security||2020 (v16.0.1221) and below||Windows||English|
|Maximum Security||2020 (v16.0.1221) and below||Windows||English|
|Internet Security||2020 (v16.0.1221) and below||Windows||English|
|Antivirus+ Security||2020 (v16.0.1221) and below||Windows||English|
Trend Micro has released a new build of the tool to resolve this issue:
|All Trend Micro Security Versions above||16.0.1227||Windows||English|
Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update. Customers who have not yet received the update can manually click Update Now to ensure they have the latest build. Customers who are still using Trend Micro Security 2019 (v15) and below can download Trend Micro Security 2020 (v16) here.
The vulnerability could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- Peleg Hadar of SafeBreach Labs
- Trần Văn Khang (aka Khang Kì Tổ) - Infiniti Team, VinCSS (a member of Vingroup)
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.