vendor:
Anti-Threat Toolkit
by:
hyp3rlinx
7.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Anti-Threat Toolkit
Affected Version From: 1.62.0.1218 and below
Affected Version To: 1.62.0.1218
Patch Exists: YES
Related CWE: CVE-2019-9491
CPE: a:trend_micro:anti-threat_toolkit
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Microsoft Windows
2019
Trend Micro Anti-Threat Toolkit 1.62.0.1218 – Remote Code Execution
Trend Micro Anti-Threat Toolkit (ATTK) will load and execute arbitrary .EXE files if a malware author happens to use the vulnerable naming convention of "cmd.exe" or "regedit.exe" and the malware can be placed in the vacinity of the ATTK when a scan is launched by the end user. Since the ATTK is signed by verified publisher and therefore assumed trusted any MOTW security warnings are bypassed if the malware was internet downloaded, also it can become a persistence mechanism as each time the Anti-Threat Toolkit is run so can an attackers malware.
Mitigation:
Update to the latest version of Trend Micro Anti-Threat Toolkit (ATTK) 1.62.0.1219