First published: Thu May 26 2022(Updated: )
An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to craft a special configuration file to load an untrusted library with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | <14.0.10349 | |
Trendmicro Apex One | =2019 | |
Microsoft Windows | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30701 is a vulnerability that allows local attackers to escalate privileges on affected installations of Trend Micro Apex One.
The severity of CVE-2022-30701 is high, with a severity value of 7.8.
To exploit CVE-2022-30701, an attacker must first obtain the ability to execute low-privileged code on the target system.
The affected software for CVE-2022-30701 includes Trend Micro Apex One versions up to 14.0.10349 and Trend Micro Trend Micro Apex One and Worry-Free Business Security 2019.
To fix CVE-2022-30701, it is recommended to update to the latest version of Trend Micro Apex One or Trend Micro Trend Micro Apex One and Worry-Free Business Security.