// For flags

CVE-2018-3608

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.

Una vulnerabilidad en el controlador UMH (User-Mode Hooking) en Trend Micro Maximum Security (Consumer) 2018 (en versiones 12.0.1191 y anteriores) podría permitir que un atacante cree un paquete especialmente manipulado que podría alterar un sistema vulnerable de forma que se pueda inyectar código malicioso en otros procesos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-27 CVE Reserved
  • 2018-07-06 CVE Published
  • 2024-03-23 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trendmicro
Search vendor "Trendmicro"
Antivirus \+ Security
Search vendor "Trendmicro" for product "Antivirus \+ Security"
<= 12.0.1191
Search vendor "Trendmicro" for product "Antivirus \+ Security" and version " <= 12.0.1191"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Trendmicro
Search vendor "Trendmicro"
Internet Security
Search vendor "Trendmicro" for product "Internet Security"
<= 12.0.1191
Search vendor "Trendmicro" for product "Internet Security" and version " <= 12.0.1191"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Trendmicro
Search vendor "Trendmicro"
Maximum Security
Search vendor "Trendmicro" for product "Maximum Security"
<= 12.0.1191
Search vendor "Trendmicro" for product "Maximum Security" and version " <= 12.0.1191"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Trendmicro
Search vendor "Trendmicro"
Premium Security
Search vendor "Trendmicro" for product "Premium Security"
<= 12.0.1191
Search vendor "Trendmicro" for product "Premium Security" and version " <= 12.0.1191"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Trendmicro
Search vendor "Trendmicro"
Officescan
Search vendor "Trendmicro" for product "Officescan"
11.0
Search vendor "Trendmicro" for product "Officescan" and version "11.0"
-
Affected
Trendmicro
Search vendor "Trendmicro"
Officescan
Search vendor "Trendmicro" for product "Officescan"
12.0
Search vendor "Trendmicro" for product "Officescan" and version "12.0"
-
Affected
Trendmicro
Search vendor "Trendmicro"
Officescan Monthly
Search vendor "Trendmicro" for product "Officescan Monthly"
11.0
Search vendor "Trendmicro" for product "Officescan Monthly" and version "11.0"
-
Affected
Trendmicro
Search vendor "Trendmicro"
Officescan Monthly
Search vendor "Trendmicro" for product "Officescan Monthly"
12.0
Search vendor "Trendmicro" for product "Officescan Monthly" and version "12.0"
-
Affected