{"api_version":"1","generated_at":"2026-04-23T00:59:58+00:00","cve":"CVE-2021-44023","urls":{"html":"https://cve.report/CVE-2021-44023","api":"https://cve.report/api/cve/CVE-2021-44023.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-44023","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-44023"},"summary":{"title":"CVE-2021-44023","description":"A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.","state":"PUBLIC","assigner":"security@trendmicro.com","published_at":"2021-12-16 03:15:00","updated_at":"2021-12-20 13:40:00"},"problem_types":["CWE-59"],"metrics":[],"references":[{"url":"https://helpcenter.trendmicro.com/en-us/article/tmka-10867","name":"https://helpcenter.trendmicro.com/en-us/article/tmka-10867","refsource":"MISC","tags":[],"title":"Security Bulletin: Trend Micro Security Link Following Denial-of-Service Vulnerability\r\n\t\t| Trend Micro Help Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1536/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-1536/","refsource":"MISC","tags":[],"title":"ZDI-21-1536 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-44023","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44023","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"44023","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44023","vulnerable":"1","versionEndIncluding":"17.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"antivirus\\+_security_2021","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44023","vulnerable":"1","versionEndIncluding":"17.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"internet_security_2021","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44023","vulnerable":"1","versionEndIncluding":"17.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"maximum_security_2021","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44023","vulnerable":"1","versionEndIncluding":"17.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"premium_security_2021","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@trendmicro.com","ID":"CVE-2021-44023","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Trend Micro Security (Consumer)","version":{"version_data":[{"version_value":"2021 (v17)"}]}}]},"vendor_name":"Trend Micro"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Link Following Denial-of-Service"}]}]},"references":{"reference_data":[{"url":"https://helpcenter.trendmicro.com/en-us/article/tmka-10867","refsource":"MISC","name":"https://helpcenter.trendmicro.com/en-us/article/tmka-10867"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1536/","refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-1536/"}]}},"nvd":{"publishedDate":"2021-12-16 03:15:00","lastModifiedDate":"2021-12-20 13:40:00","problem_types":["CWE-59"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":3.6},"severity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:antivirus\\+_security_2021:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:internet_security_2021:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:maximum_security_2021:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:premium_security_2021:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"44023","Ordinal":"221655","Title":"CVE-2021-44023","CVE":"CVE-2021-44023","Year":"2021"},"notes":[]}}}