SECURITY BULLETIN: Trend Micro Ransom Buster and Trend Micro Security 2019 (Consumer) Folder Shield DLL Hijack Vulnerability

  • Solution ID:1123421
  • Last Updated:Aug. 14, 2019 1:42 PM (PST)
  • Applies to:Antivirus+ Security - 2019;Internet Security - 2019;Maximum Security - 2019;Premium Security - 2019;
Release Date: August 14, 2019 
CVE Vulnerability Identifier(s): CVE-2019-14686
Platform: Windows 
CVSS 3.0 Score: 5.4 
Severity Rating: Medium

Summary

Trend Micro has released a new build for Trend Micro Security 2019 (version 15.0) family of consumer products which resolve a DLL hijacking vulnerability in the Folder Shield feature of the product.

In addition, the same vulnerability exists in the standalone Trend Micro Ransom Buster tool which is based on the same code but been officially retired and is no longer publicly available or supported.  

 

Affected versions
ProductAffected VersionsPlatformLanguage(s)
Premium Security 2019 (v15) Microsoft Windows English
Maximum Security
2019 (v15)
Microsoft Windows English
Internet Security
2019 (v15)
Microsoft Windows English
Antivirus + Security
2019 (v15)
Microsoft Windows English
Ransom Buster v1.0 Microsoft Windows English

 

Solution
ProductUpdated BuildPlatformLanguage(s)
Trend Micro Security 2019 15.0.1163 Microsoft Windows English
Ransom Buster Retired (EOL) Microsoft Windows English

 

Trend Micro has addressed these vulnerabilities in Trend Micro Security 2019 via a patch that is available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Security 2019 (version 15) listed above. 

The vulnerability is not being addressed in the standalone Ransom Buster tool since it has been officially retired as mentioned above.

 

Vulnerability Details:

This patch includes mitigation for the following vulnerabilities:

  • CVE-2019-14686: A DLL hijacking vulnerability exists in the Trend Micro Security 2019 Folder Shield component and the standalone Trend Micro Ransom Buster tool in which, if exploited, would allow an attacker to load a malicious DLL, leading to elevated privileges.  

Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.

 

Mitigating Factors

Exploiting these types of vulnerabilities require that an attacker has access (physical or remote) to a vulnerable machine.

Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to upgrade to the latest build as soon as possible.

 

Acknowledgement

Trend Micro would like to thank the following individuals and/or organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:

  • Attila Marosi-Bauer of Hacktivity Lab
Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.