Release Date: December 19, 2019
CVE Vulnerability Identifiers: CVE-2019-19693
ZDI Identifier: ZDI-19-1025
CVSS 3.0 Scores: 7.1
Severity Ratings: High
Trend Micro has released a patch for a vulnerability in Trend Micro Security 2020 (Consumer) that may allow a user that does not have the required privileges to delete certain files they normally would not have access to, which may also lead to a denail-of-service (DoS).
|Premium Security||2020 (v16)||Windows||English|
|Maximum Security||2020 (v16)||Windows||English|
|Internet Security||2020 (v16)||Windows||English|
|Antivirus+ Security||2020 (v16)||Windows||English|
Trend Micro has released an updated build of the product that resolves this issue:
|All Trend Micro Security versions listed above||2020 (v16.0.1249)||Windows||English|
Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate (AU) feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update.
Customers who have not yet received the update can manually click Update Now to ensure they have the latest build.
This update resolves the vulnerability found in the Trend Micro Security 2020 (version 16.0) consumer family of products where an attacker may maniuplate junction files to delete certain protected system on the target machine without the usual required permissions, which may also lead to a denial-of-service (DoS) and the target machine.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- Nabeel Ahmed (@rogue_kdc) working with Trend Micro's Zero Day Initiative
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.