CVE-2019-15627
Summary
| CVE | CVE-2019-15627 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-10-17 19:15:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | Versions 10.0, 11.0 and 12.0 of the Trend Micro Deep Security Agent are vulnerable to an arbitrary file delete attack, which may lead to availability impact. Local OS access is required. Please note that only Windows agents are affected. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Microsoft | Windows | - | All | All | All |
| Operating System | Microsoft | Windows | - | All | All | All |
| Application | Trendmicro | Deep Security | 10.0 | All | All | All |
| Application | Trendmicro | Deep Security | 11.0 | All | All | All |
| Application | Trendmicro | Deep Security | 12.0 | All | All | All |
| Application | Trendmicro | Deep Security | 10.0 | All | All | All |
| Application | Trendmicro | Deep Security | 11.0 | All | All | All |
| Application | Trendmicro | Deep Security | 12.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Deep Security StartTLS LDAP Confidentiality and Local Arbitrary File Overwrite Vulnerabilities - Trend Micro | N/A | success.trendmicro.com | Vendor Advisory |
| Trend Micro Deep Security Agent 11 Arbitrary File Overwrite ≈ Packet Storm | MISC | packetstormsecurity.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.