ID

VAR-201807-1704


CVE

CVE-2018-3608


TITLE

Trend Micro Maximum Security Code injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-007210

DESCRIPTION

A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes. Trend Micro Maximum Security Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state

Trust: 1.71

sources: NVD: CVE-2018-3608 // JVNDB: JVNDB-2018-007210 // VULMON: CVE-2018-3608

AFFECTED PRODUCTS

vendor:trendmicromodel:officescan monthlyscope:eqversion:12.0

Trust: 1.6

vendor:trendmicromodel:officescan monthlyscope:eqversion:11.0

Trust: 1.6

vendor:trendmicromodel:officescanscope:eqversion:12.0

Trust: 1.6

vendor:trendmicromodel:officescanscope:eqversion:11.0

Trust: 1.6

vendor:trendmicromodel:premium securityscope:lteversion:12.0.1191

Trust: 1.0

vendor:trendmicromodel:antivirus \+ securityscope:lteversion:12.0.1191

Trust: 1.0

vendor:trendmicromodel:internet securityscope:lteversion:12.0.1191

Trust: 1.0

vendor:trendmicromodel:maximum securityscope:lteversion:12.0.1191

Trust: 1.0

vendor:trend micromodel:antivirus + securityscope: - version: -

Trust: 0.8

vendor:trend micromodel:internet securityscope: - version: -

Trust: 0.8

vendor:trend micromodel:maximum securityscope:lteversion:2018 12.0.1191

Trust: 0.8

vendor:trend micromodel:officescanscope:eqversion:none

Trust: 0.8

vendor:trend micromodel:officescanscope:eqversion:monthly

Trust: 0.8

vendor:trend micromodel:premium securityscope: - version: -

Trust: 0.8

vendor:trendmicromodel:antivirus \+ securityscope:eqversion:12.0.1191

Trust: 0.6

vendor:trendmicromodel:maximum securityscope:eqversion:12.0.1191

Trust: 0.6

vendor:trendmicromodel:internet securityscope:eqversion:12.0.1191

Trust: 0.6

vendor:trendmicromodel:premium securityscope:eqversion:12.0.1191

Trust: 0.6

sources: JVNDB: JVNDB-2018-007210 // CNNVD: CNNVD-201807-382 // NVD: CVE-2018-3608

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3608
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-3608
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201807-382
value: CRITICAL

Trust: 0.6

VULMON: CVE-2018-3608
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-3608
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2018-3608
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULMON: CVE-2018-3608 // JVNDB: JVNDB-2018-007210 // CNNVD: CNNVD-201807-382 // NVD: CVE-2018-3608

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2018-007210 // NVD: CVE-2018-3608

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-382

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201807-382

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007210

PATCH

title:1120237url:https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx

Trust: 0.8

title:1120144url:http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx

Trust: 0.8

title:Multiple Trend Micro product User-Mode Hooking Driver security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81804

Trust: 0.6

title:Trend_Micro_POCurl:https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:CVE-POCurl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2018-3608 // JVNDB: JVNDB-2018-007210 // CNNVD: CNNVD-201807-382

EXTERNAL IDS

db:NVDid:CVE-2018-3608

Trust: 2.5

db:JVNDBid:JVNDB-2018-007210

Trust: 0.8

db:CNNVDid:CNNVD-201807-382

Trust: 0.6

db:VULMONid:CVE-2018-3608

Trust: 0.1

sources: VULMON: CVE-2018-3608 // JVNDB: JVNDB-2018-007210 // CNNVD: CNNVD-201807-382 // NVD: CVE-2018-3608

REFERENCES

url:https://esupport.trendmicro.com/en-us/home/pages/technical-support/1120237.aspx

Trust: 1.7

url:http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3608

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3608

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:https://github.com/zhiyuanwang-chengdu-qihoo360/trend_micro_poc

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2018-3608 // JVNDB: JVNDB-2018-007210 // CNNVD: CNNVD-201807-382 // NVD: CVE-2018-3608

SOURCES

db:VULMONid:CVE-2018-3608
db:JVNDBid:JVNDB-2018-007210
db:CNNVDid:CNNVD-201807-382
db:NVDid:CVE-2018-3608

LAST UPDATE DATE

2024-11-23T23:02:02.833000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2018-3608date:2018-08-28T00:00:00
db:JVNDBid:JVNDB-2018-007210date:2018-09-11T00:00:00
db:CNNVDid:CNNVD-201807-382date:2018-07-10T00:00:00
db:NVDid:CVE-2018-3608date:2024-11-21T04:05:45.770

SOURCES RELEASE DATE

db:VULMONid:CVE-2018-3608date:2018-07-06T00:00:00
db:JVNDBid:JVNDB-2018-007210date:2018-09-11T00:00:00
db:CNNVDid:CNNVD-201807-382date:2018-07-06T00:00:00
db:NVDid:CVE-2018-3608date:2018-07-06T19:29:00.590