-
Notifications
You must be signed in to change notification settings - Fork 34
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Trend Micro Patches Multiple Vulnerability - 20240510005 - Advisory (#…
…715) * Trend Micro Patches Multiple Vulnerability - 20240510005 - Advisory * Format markdown docs --------- Co-authored-by: mahmadhabib076 <mahmadhabib076@users.noreply.github.com> Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
- Loading branch information
1 parent
a8e14bf
commit 49e0d62
Showing
1 changed file
with
29 additions
and
0 deletions.
There are no files selected for viewing
29 changes: 29 additions & 0 deletions
29
docs/advisories/20240510005-Trend-Micro-Patches-Multiple-Vulnerability.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# Trend Micro Patches Multiple Vulnerability - 20240510005 | ||
|
||
## Overview | ||
|
||
Trend Micro, has released an important update for its Antivirus One software, targeting a critical vulnerability that could have allowed attackers to inject malicious code. The vulnerability specifically affects the Macintosh platform. | ||
|
||
They have also issued a security update to its Maximum Security software for Windows users, addressing a significant local privilege escalation vulnerability. | ||
|
||
## What is vulnerable? | ||
|
||
| CVE | Severity | CVSS | Product(s) Affected | | ||
| ----------------------------------------------------------------- | -------- | ------------- | ------------------------------------------------------------------------ | | ||
| [CVE-2024-34456](https://nvd.nist.gov/vuln/detail/CVE-2024-34456) | **N/A** | Not yet rated | **Antivirus One for Mac up to version 3.10.3** | | ||
| [CVE-2024-32849](https://nvd.nist.gov/vuln/detail/CVE-2024-32849) | **High** | 7.8 | **Trend Micro Security 17.7 (Consumer) for Windows, prior to 17.7.1979** | | ||
|
||
## What has been observed? | ||
|
||
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- [TREND - SECURITY BULLETIN: Code Injection in Trend Micro Antivirus One](https://helpcenter.trendmicro.com/en-us/article/tmka-18372#:~:text=Summary,code%20within%20the%20application's%20context..) | ||
|
||
## Additional References | ||
|
||
- [CVE-2024-32849: Trend Micro Maximum Security Privilege Escalation Vulnerability](https://securityonline.info/cve-2024-32849-trend-micro-maximum-security-privilege-escalation-vulnerability/) | ||
- [CVE-2024-34456: Trend Micro Patches Code Injection Vulnerability in Antivirus One](https://securityonline.info/cve-2024-34456-trend-micro-patches-code-injection-vulnerability-in-antivirus-one/) |