From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: Trend Micro Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) 2. Product/Version: Deep Security 20.0, Cloud One - Endpoint and Workload Security All 3. Release Date: November 18, 2024 4. CVE Identifier: CVE-2024-51503 5. Platform: Windows 6. CVSS 3.0 Score: 8.0 7. Weakness ID: CWE-78: OS Command Injection 8. Severity Rating: HIGH 9. Affected Versions: - Deep Security Agent: Versions prior to 20.0.1-21510 - Deep Security Notifier on DSVA: Version 20.0.0-8438 only 10. Solution: - Deep Security Agent: Upgrade to 20.0.1-21510 (20 LTS Update 2024-10-16) - Deep Security Notifier on DSVA: Affected clients should install the full DSA 20.0.1 package or later to update the notifier functionality 11. Vulnerability Details: - Description: A command injection vulnerability in the security agent’s manual scan feature allows attackers to escalate privileges and execute arbitrary code on affected machines. - CVSSv3 Score: 8.0 - Weakness: CWE-78: OS Command Injection 12. Mitigating Factors: - Generally requires attackers to have physical or remote access to the target machine. - It is recommended to promptly apply patches and updates, and review remote access permissions and boundary security for critical systems. 13. Acknowledgments: - Thanks to Simon Zuckerbraun for participating in Trend Micro’s zero-day vulnerability response program. This information provides a detailed description of the vulnerability, affected versions, remediation steps, and mitigation measures.