First published: Sat Jan 08 2022(Updated: )
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Trendmicro Worry-free Business Security | =10.0-sp1 | |
Trendmicro Worry-free Business Security Services | ||
Microsoft Windows | ||
Trend Micro Apex One | ||
All of | ||
Any of | ||
Trendmicro Apex One | =2019 | |
Trendmicro Apex One | =2019 | |
Trendmicro Worry-free Business Security | =10.0-sp1 | |
Trendmicro Worry-free Business Security Services | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-45231 is high with a CVSS score of 7.8.
The vulnerability CVE-2021-45231 allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent by executing low-privileged code on the target system.
The software affected by CVE-2021-45231 includes Trend Micro Apex One and Worry-Free Business Security.
To fix CVE-2021-45231, it is recommended to install the latest security updates provided by Trend Micro.
For more information about CVE-2021-45231, you can refer to the following references: [link1](https://success.trendmicro.com/solution/000289996), [link2](https://www.zerodayinitiative.com/advisories/ZDI-22-013/).