SECURITY BULLETIN: Trend Micro Security (Consumer) 2018 Privilege Escalation Vulnerabilities
CVE Vulnerability Identifiers: CVE-2018-10513, CVE-2018-105014, CVE-2018-15363
Platform: Windows OS
CVSS 3.0 Scores: 6.9 - 7.2
Severity Ratings: Medium and High
Trend Micro has released fixes for the Trend Micro Security 2018 (version 12.0) family of consumer products resolving vulnerabilities that could allow an attacker to escalate privileges on a vulnerable system that they would otherwise not have access to.
|Premium Security||12.0 and below||Microsoft Windows||English|
|Maximum Security||12.0 and below||Microsoft Windows||English|
|Internet Security||12.0 and below||Microsoft Windows||English|
|Antivirus + Security||12.0 and below||Microsoft Windows||English|
|All Versions At or Above||12.0.1226||Microsoft Windows||English|
Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Security 2018 (version 12) listed above. Customers who have at least version 12.0.1226 (as of August 2018) will already have the necessary patch applied.
This patch includes mitigations for the following vulnerabilities:
- CVE-2018-10513: Deserialization of Untrusted Data Privilege Escalation vulnerability
- CVE-2018-10514: Missing Impersonation Privilege Escalation vulnerability
- CVE-2018-15363: Out-of-Bounds Read Privilege Escalation vulnerability
Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.
Exploiting these types of vulnerabilities require that an attacker has access (physical or remote) to a vulnerable machine.
Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to upgrade to the latest build as soon as possible.
Trend Micro would like to thank the following individuals and/or organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:
- Anonymous working with Trend Micro's Zero Day Initiative
The following advisories may be found by visiting the following sites:
ZDI Advisories - Trend Micro's Zero Day Initiative Published Advisories
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.