Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2019-19697
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administrator privileges on the target machine in order to exploit the vulnerability..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.2/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 6.7/10
- Exploit Score
- 0.8/10
- Access Vector
- Local
- Access Complexity
- Low
- Privileges Required
- High
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:trendmicro:antivirus_\+_security_2019:15.0:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:trendmicro:internet_security_2019:15.0:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:trendmicro:maximum_security_2019:15.0:*:*:*:*:*:*: |
Yes
|
- | ||
cpe:2.3:a:trendmicro:premium_security_2019:15.0:*:*:*:*:*:*: |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
No
|
- |