First published: Thu Jan 20 2022(Updated: )
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Deep Security Agent | >=20.0<20.0.0-3445 | |
Trend Micro Deep Security Agent | =10.0 | |
Trend Micro Deep Security Agent | =10.0-update1 | |
Trend Micro Deep Security Agent | =10.0-update10 | |
Trend Micro Deep Security Agent | =10.0-update11 | |
Trend Micro Deep Security Agent | =10.0-update12 | |
Trend Micro Deep Security Agent | =10.0-update13 | |
Trend Micro Deep Security Agent | =10.0-update14 | |
Trend Micro Deep Security Agent | =10.0-update15 | |
Trend Micro Deep Security Agent | =10.0-update16 | |
Trend Micro Deep Security Agent | =10.0-update17 | |
Trend Micro Deep Security Agent | =10.0-update18 | |
Trend Micro Deep Security Agent | =10.0-update19 | |
Trend Micro Deep Security Agent | =10.0-update2 | |
Trend Micro Deep Security Agent | =10.0-update20 | |
Trend Micro Deep Security Agent | =10.0-update21 | |
Trend Micro Deep Security Agent | =10.0-update22 | |
Trend Micro Deep Security Agent | =10.0-update23 | |
Trend Micro Deep Security Agent | =10.0-update24 | |
Trend Micro Deep Security Agent | =10.0-update25 | |
Trend Micro Deep Security Agent | =10.0-update26 | |
Trend Micro Deep Security Agent | =10.0-update27 | |
Trend Micro Deep Security Agent | =10.0-update28 | |
Trend Micro Deep Security Agent | =10.0-update29 | |
Trend Micro Deep Security Agent | =10.0-update3 | |
Trend Micro Deep Security Agent | =10.0-update30 | |
Trend Micro Deep Security Agent | =10.0-update31 | |
Trend Micro Deep Security Agent | =10.0-update4 | |
Trend Micro Deep Security Agent | =10.0-update5 | |
Trend Micro Deep Security Agent | =10.0-update6 | |
Trend Micro Deep Security Agent | =10.0-update7 | |
Trend Micro Deep Security Agent | =10.0-update8 | |
Trend Micro Deep Security Agent | =10.0-update9 | |
Trend Micro Deep Security Agent | =11.0 | |
Trend Micro Deep Security Agent | =11.0-update1 | |
Trend Micro Deep Security Agent | =11.0-update10 | |
Trend Micro Deep Security Agent | =11.0-update11 | |
Trend Micro Deep Security Agent | =11.0-update12 | |
Trend Micro Deep Security Agent | =11.0-update13 | |
Trend Micro Deep Security Agent | =11.0-update14 | |
Trend Micro Deep Security Agent | =11.0-update15 | |
Trend Micro Deep Security Agent | =11.0-update16 | |
Trend Micro Deep Security Agent | =11.0-update17 | |
Trend Micro Deep Security Agent | =11.0-update18 | |
Trend Micro Deep Security Agent | =11.0-update19 | |
Trend Micro Deep Security Agent | =11.0-update2 | |
Trend Micro Deep Security Agent | =11.0-update20 | |
Trend Micro Deep Security Agent | =11.0-update21 | |
Trend Micro Deep Security Agent | =11.0-update22 | |
Trend Micro Deep Security Agent | =11.0-update23 | |
Trend Micro Deep Security Agent | =11.0-update24 | |
Trend Micro Deep Security Agent | =11.0-update25 | |
Trend Micro Deep Security Agent | =11.0-update26 | |
Trend Micro Deep Security Agent | =11.0-update27 | |
Trend Micro Deep Security Agent | =11.0-update3 | |
Trend Micro Deep Security Agent | =11.0-update4 | |
Trend Micro Deep Security Agent | =11.0-update5 | |
Trend Micro Deep Security Agent | =11.0-update6 | |
Trend Micro Deep Security Agent | =11.0-update7 | |
Trend Micro Deep Security Agent | =11.0-update8 | |
Trend Micro Deep Security Agent | =11.0-update9 | |
Trend Micro Deep Security Agent | =12.0 | |
Trend Micro Deep Security Agent | =12.0-update1 | |
Trend Micro Deep Security Agent | =12.0-update10 | |
Trend Micro Deep Security Agent | =12.0-update11 | |
Trend Micro Deep Security Agent | =12.0-update12 | |
Trend Micro Deep Security Agent | =12.0-update13 | |
Trend Micro Deep Security Agent | =12.0-update14 | |
Trend Micro Deep Security Agent | =12.0-update15 | |
Trend Micro Deep Security Agent | =12.0-update16 | |
Trend Micro Deep Security Agent | =12.0-update17 | |
Trend Micro Deep Security Agent | =12.0-update18 | |
Trend Micro Deep Security Agent | =12.0-update19 | |
Trend Micro Deep Security Agent | =12.0-update2 | |
Trend Micro Deep Security Agent | =12.0-update20 | |
Trend Micro Deep Security Agent | =12.0-update21 | |
Trend Micro Deep Security Agent | =12.0-update3 | |
Trend Micro Deep Security Agent | =12.0-update4 | |
Trend Micro Deep Security Agent | =12.0-update5 | |
Trend Micro Deep Security Agent | =12.0-update6 | |
Trend Micro Deep Security Agent | =12.0-update7 | |
Trend Micro Deep Security Agent | =12.0-update8 | |
Trend Micro Deep Security Agent | =12.0-update9 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23119 is classified as a critical severity vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2022-23119, you should update the Trend Micro Deep Security Agent to a version that addresses this vulnerability.
CVE-2022-23119 affects Trend Micro Deep Security Agent versions 20.0 and below, including various updates of the 10.0, 11.0, and 12.0 versions.
CVE-2022-23119 is a directory traversal vulnerability that allows attackers to read arbitrary files from the file system.
An attacker must first obtain compromised access to the target Deep Security Manager to exploit CVE-2022-23119.