Unrated severityNVD Advisory· Published Jan 21, 2009· Updated Apr 23, 2026
CVE-2008-3866
CVE-2008-3866
Description
The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.
Affected products
3- cpe:2.3:a:trend_micro:internet_security_2007:*:*:*:*:*:*:*:*
- cpe:2.3:a:trend_micro:internet_security_2008:17.0.1224:*:*:*:*:*:*:*
- cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/31160nvdPatchVendor Advisory
- secunia.com/advisories/33609nvdPatchVendor Advisory
- www.securityfocus.com/bid/33358nvdPatch
- secunia.com/secunia_research/2008-43/nvdVendor Advisory
- www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txtnvdVendor Advisory
- www.securitytracker.com/idnvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2009/0191nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/48108nvd
News mentions
0No linked articles in our index yet.