First published: Thu Oct 21 2021(Updated: )
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Microsoft Windows | ||
Trend Micro Apex One | ||
All of | ||
Any of | ||
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42102 is categorized as high due to the potential for privilege escalation by local attackers.
To fix CVE-2021-42102, ensure that you update to the latest version of Trend Micro Apex One that addresses this vulnerability.
Users of Trend Micro Apex One 2019 and Apex One as a Service are affected by CVE-2021-42102.
CVE-2021-42102 allows local attackers to escalate privileges on affected installations after executing low-privileged code.
CVE-2021-42102 was published in 2021 as part of ongoing security assessments of Trend Micro products.