CVE-2019-18190

9.8 CRITICAL

📋 TL;DR

Trend Micro Security 2020 (v16.x) contains a null pointer dereference vulnerability that causes application crashes and could potentially allow unsigned code execution under specific conditions. This affects consumers using Trend Micro's 2020 security software version 16.x. The vulnerability has a critical CVSS score of 9.8 due to its potential for remote exploitation.

💻 Affected Systems

Products:
  • Trend Micro Security (Consumer) 2020
Versions: 16.x
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Consumer edition only; enterprise/business products may have different codebase.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full system control through unsigned code execution, potentially installing malware, stealing data, or creating persistent backdoors.

🟠

Likely Case

Application crashes leading to denial of service and temporary loss of security protection, creating a window for other attacks.

🟢

If Mitigated

Application crashes but security controls prevent code execution, requiring user intervention to restart the security software.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CVSS 9.8 suggests network-accessible attack vector without authentication, but specific exploitation details not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Trend Micro Security 2020 with latest patches (post-16.x)

Vendor Advisory: https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124031.aspx

Restart Required: Yes

Instructions:

1. Open Trend Micro Security 2020. 2. Click 'Check for Updates'. 3. Apply all available updates. 4. Restart computer when prompted.

🔧 Temporary Workarounds

Temporary Disable Network Access

windows

Limit exposure by restricting network access to affected systems while awaiting patch

netsh advfirewall set allprofiles state on
netsh advfirewall firewall add rule name="Block Trend Micro" dir=in action=block program="C:\Program Files\Trend Micro\Security\*" enable=yes

🧯 If You Can't Patch

  • Uninstall Trend Micro Security 2020 and use alternative security software
  • Implement network segmentation to isolate affected systems from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check Trend Micro Security version: Open application → Help → About. If version starts with 16, system is vulnerable.

Check Version:

wmic product where "name like 'Trend Micro Security%'" get version

Verify Fix Applied:

Verify version is updated beyond 16.x and check for recent update history in application logs.

📡 Detection & Monitoring

Log Indicators:

  • Trend Micro application crash logs
  • Windows Event Logs with Trend Micro process termination
  • Unexpected security service restarts

Network Indicators:

  • Unusual network traffic to/from Trend Micro processes
  • Connection attempts to Trend Micro service ports (typically 4118, 4343)

SIEM Query:

source="windows" AND (process_name="*Trend Micro*" AND event_id=1000) OR (process_name="*tm*" AND termination_reason="*crash*")

🔗 References

📤 Share & Export