Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-3608

EPSS 3.67% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-3608

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Trend Micro产品User-Mode Hooking驱动程序安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Trend Micro Premium Security等都是美国趋势科技(Trend Micro)公司的防病毒软件产品。User-Mode Hooking(UMH)driver是其中的一个用户模式启动程序。 多款Trend Micro产品中的UMH驱动程序存在安全漏洞。攻击者可通过创建特制的数据包利用该漏洞更改受影响的系统。基于Windows平台的以下产品和版本受到影响:Trend Micro Premium Security 12.0.1191及之前版本;Maximum Security 12.0.1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Trend MicroTrend Micro Maximum Security (Consumer) 2018 (12.0.1191) -

II. Public POCs for CVE-2018-3608

#POC DescriptionSource LinkShenlong Link
1CVE-2018-3608 Trend_Micro_CVEhttps://github.com/gguaiker/Trend_Micro_POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-3608

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2018-3608

No comments yet


Leave a comment