vendor:
Trend Micro Maximum Security 2019
by:
hyp3rlinx
6.7
CVSS
MEDIUM
Security Bypass Protected Service Tampering
287
CWE
Product Name: Trend Micro Maximum Security 2019
Affected Version From: Premium Security 2019 (v15)
Affected Version To: Antivirus + Security 2019 (v15)
Patch Exists: NO
Related CWE: CVE-2019-19697
CPE: a:trend_micro:trend_micro_maximum_security_2019
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Microsoft Windows
2020
Trend Micro Maximum Security 2019 – Arbitrary Code Execution
Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability.
Mitigation:
Create a entry for the registry key targeting "PtWatchdog.exe" and set the debugger string value to an arbitrary executable to gain SYSTEM privileges.