First published: Thu Oct 21 2021(Updated: )
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103.
Credit: security@trendmicro.com security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Microsoft Windows | ||
Trend Micro Apex One | ||
All of | ||
Any of | ||
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42101 is rated as high due to the potential for local privilege escalation.
To fix CVE-2021-42101, apply the latest security updates from Trend Micro for Apex One.
CVE-2021-42101 affects Trend Micro Apex One version 2019.
No, CVE-2021-42101 requires local access to the system for exploitation.
CVE-2021-42101 enables local attackers to escalate their privileges on affected installations.