ID

VAR-202109-1505


CVE

CVE-2021-36744


TITLE

Trend Micro Security 2021  and  2020  Link interpretation vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-011443

DESCRIPTION

Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an attacker to exploit the system to escalate privileges and create a denial of service. (DoS) It may be in a state. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the Maximum Security Agent. By creating a directory junction, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.88

sources: NVD: CVE-2021-36744 // JVNDB: JVNDB-2021-011443 // ZDI: ZDI-21-1052 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-36744

AFFECTED PRODUCTS

vendor:trendmicromodel:maximum security 2021scope:eqversion:17.2

Trust: 1.0

vendor:trendmicromodel:maximum security 2019scope:eqversion:15.0

Trust: 1.0

vendor:trendmicromodel:maximum security 2021scope:eqversion:17.0

Trust: 1.0

vendor:trendmicromodel:maximum security 2020scope:eqversion:16.0

Trust: 1.0

vendor:trendmicromodel:security for best buyscope:eqversion:2021

Trust: 1.0

vendor:トレンドマイクロmodel:trend micro security for best buyscope: - version: -

Trust: 0.8

vendor:トレンドマイクロmodel:trend micro maximum security 2019scope: - version: -

Trust: 0.8

vendor:トレンドマイクロmodel:trend micro maximum security 2021scope: - version: -

Trust: 0.8

vendor:トレンドマイクロmodel:trend micro maximum security 2020scope: - version: -

Trust: 0.8

vendor:trend micromodel:maximum securityscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1052 // JVNDB: JVNDB-2021-011443 // NVD: CVE-2021-36744

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-36744
value: HIGH

Trust: 1.0

NVD: CVE-2021-36744
value: HIGH

Trust: 0.8

ZDI: CVE-2021-36744
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202108-2671
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-36744
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-36744
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-36744
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2021-36744
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 4.2
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-1052 // JVNDB: JVNDB-2021-011443 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-2671 // NVD: CVE-2021-36744

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.0

problemtype:Link interpretation problem (CWE-59) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-011443 // NVD: CVE-2021-36744

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202108-2671

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Security Bulletinurl:https://helpcenter.trendmicro.com/en-us/article/tmka-10568

Trust: 1.5

title:Trend Micro Security Post-link vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=162540

Trust: 0.6

sources: ZDI: ZDI-21-1052 // JVNDB: JVNDB-2021-011443 // CNNVD: CNNVD-202108-2671

EXTERNAL IDS

db:NVDid:CVE-2021-36744

Trust: 4.0

db:ZDIid:ZDI-21-1052

Trust: 2.4

db:JVNDBid:JVNDB-2021-011443

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-13371

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021082901

Trust: 0.6

db:CNNVDid:CNNVD-202108-2671

Trust: 0.6

db:VULMONid:CVE-2021-36744

Trust: 0.1

sources: ZDI: ZDI-21-1052 // VULMON: CVE-2021-36744 // JVNDB: JVNDB-2021-011443 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-2671 // NVD: CVE-2021-36744

REFERENCES

url:https://helpcenter.trendmicro.com/en-us/article/tmka-10568

Trust: 2.3

url:https://www.zerodayinitiative.com/advisories/zdi-21-1052/

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-36744

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021082901

Trust: 0.6

sources: ZDI: ZDI-21-1052 // VULMON: CVE-2021-36744 // JVNDB: JVNDB-2021-011443 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-2671 // NVD: CVE-2021-36744

CREDITS

Abdelhamid Naceri (halov)

Trust: 1.3

sources: ZDI: ZDI-21-1052 // CNNVD: CNNVD-202108-2671

SOURCES

db:ZDIid:ZDI-21-1052
db:VULMONid:CVE-2021-36744
db:JVNDBid:JVNDB-2021-011443
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202108-2671
db:NVDid:CVE-2021-36744

LAST UPDATE DATE

2024-08-14T12:56:41.765000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-1052date:2021-08-30T00:00:00
db:JVNDBid:JVNDB-2021-011443date:2022-07-29T07:27:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202108-2671date:2022-07-14T00:00:00
db:NVDid:CVE-2021-36744date:2022-07-12T17:42:04.277

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-1052date:2021-08-30T00:00:00
db:JVNDBid:JVNDB-2021-011443date:2022-07-29T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202108-2671date:2021-08-29T00:00:00
db:NVDid:CVE-2021-36744date:2021-09-06T12:15:08.040