7.5
CWE
22
Advisory Published
Updated

CVE-2022-23119: Path Traversal

First published: Thu Jan 20 2022(Updated: )

A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.

Credit: security@trendmicro.com

Affected SoftwareAffected VersionHow to fix
Trend Micro Deep Security Agent>=20.0<20.0.0-3445
Trend Micro Deep Security Agent=10.0
Trend Micro Deep Security Agent=10.0-update1
Trend Micro Deep Security Agent=10.0-update10
Trend Micro Deep Security Agent=10.0-update11
Trend Micro Deep Security Agent=10.0-update12
Trend Micro Deep Security Agent=10.0-update13
Trend Micro Deep Security Agent=10.0-update14
Trend Micro Deep Security Agent=10.0-update15
Trend Micro Deep Security Agent=10.0-update16
Trend Micro Deep Security Agent=10.0-update17
Trend Micro Deep Security Agent=10.0-update18
Trend Micro Deep Security Agent=10.0-update19
Trend Micro Deep Security Agent=10.0-update2
Trend Micro Deep Security Agent=10.0-update20
Trend Micro Deep Security Agent=10.0-update21
Trend Micro Deep Security Agent=10.0-update22
Trend Micro Deep Security Agent=10.0-update23
Trend Micro Deep Security Agent=10.0-update24
Trend Micro Deep Security Agent=10.0-update25
Trend Micro Deep Security Agent=10.0-update26
Trend Micro Deep Security Agent=10.0-update27
Trend Micro Deep Security Agent=10.0-update28
Trend Micro Deep Security Agent=10.0-update29
Trend Micro Deep Security Agent=10.0-update3
Trend Micro Deep Security Agent=10.0-update30
Trend Micro Deep Security Agent=10.0-update31
Trend Micro Deep Security Agent=10.0-update4
Trend Micro Deep Security Agent=10.0-update5
Trend Micro Deep Security Agent=10.0-update6
Trend Micro Deep Security Agent=10.0-update7
Trend Micro Deep Security Agent=10.0-update8
Trend Micro Deep Security Agent=10.0-update9
Trend Micro Deep Security Agent=11.0
Trend Micro Deep Security Agent=11.0-update1
Trend Micro Deep Security Agent=11.0-update10
Trend Micro Deep Security Agent=11.0-update11
Trend Micro Deep Security Agent=11.0-update12
Trend Micro Deep Security Agent=11.0-update13
Trend Micro Deep Security Agent=11.0-update14
Trend Micro Deep Security Agent=11.0-update15
Trend Micro Deep Security Agent=11.0-update16
Trend Micro Deep Security Agent=11.0-update17
Trend Micro Deep Security Agent=11.0-update18
Trend Micro Deep Security Agent=11.0-update19
Trend Micro Deep Security Agent=11.0-update2
Trend Micro Deep Security Agent=11.0-update20
Trend Micro Deep Security Agent=11.0-update21
Trend Micro Deep Security Agent=11.0-update22
Trend Micro Deep Security Agent=11.0-update23
Trend Micro Deep Security Agent=11.0-update24
Trend Micro Deep Security Agent=11.0-update25
Trend Micro Deep Security Agent=11.0-update26
Trend Micro Deep Security Agent=11.0-update27
Trend Micro Deep Security Agent=11.0-update3
Trend Micro Deep Security Agent=11.0-update4
Trend Micro Deep Security Agent=11.0-update5
Trend Micro Deep Security Agent=11.0-update6
Trend Micro Deep Security Agent=11.0-update7
Trend Micro Deep Security Agent=11.0-update8
Trend Micro Deep Security Agent=11.0-update9
Trend Micro Deep Security Agent=12.0
Trend Micro Deep Security Agent=12.0-update1
Trend Micro Deep Security Agent=12.0-update10
Trend Micro Deep Security Agent=12.0-update11
Trend Micro Deep Security Agent=12.0-update12
Trend Micro Deep Security Agent=12.0-update13
Trend Micro Deep Security Agent=12.0-update14
Trend Micro Deep Security Agent=12.0-update15
Trend Micro Deep Security Agent=12.0-update16
Trend Micro Deep Security Agent=12.0-update17
Trend Micro Deep Security Agent=12.0-update18
Trend Micro Deep Security Agent=12.0-update19
Trend Micro Deep Security Agent=12.0-update2
Trend Micro Deep Security Agent=12.0-update20
Trend Micro Deep Security Agent=12.0-update21
Trend Micro Deep Security Agent=12.0-update3
Trend Micro Deep Security Agent=12.0-update4
Trend Micro Deep Security Agent=12.0-update5
Trend Micro Deep Security Agent=12.0-update6
Trend Micro Deep Security Agent=12.0-update7
Trend Micro Deep Security Agent=12.0-update8
Trend Micro Deep Security Agent=12.0-update9
Linux kernel

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-23119?

    CVE-2022-23119 is classified as a critical severity vulnerability due to its potential to expose sensitive information.

  • How do I fix CVE-2022-23119?

    To mitigate CVE-2022-23119, you should update the Trend Micro Deep Security Agent to a version that addresses this vulnerability.

  • Which versions of Trend Micro Deep Security Agent are affected by CVE-2022-23119?

    CVE-2022-23119 affects Trend Micro Deep Security Agent versions 20.0 and below, including various updates of the 10.0, 11.0, and 12.0 versions.

  • What type of vulnerability is CVE-2022-23119?

    CVE-2022-23119 is a directory traversal vulnerability that allows attackers to read arbitrary files from the file system.

  • What conditions must be met for CVE-2022-23119 to be exploited?

    An attacker must first obtain compromised access to the target Deep Security Manager to exploit CVE-2022-23119.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203