First published: Fri Jul 29 2022(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from incorrect permissions set on a directory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Vpn Proxy One Pro | <=5.2.1026 | |
Microsoft Windows | ||
Trend Micro Proxy One Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33158 has a CVSS score indicating a high severity due to its potential for privilege escalation by local attackers.
To fix CVE-2022-33158, it is recommended to update Trend Micro Proxy One Pro to the latest version available.
CVE-2022-33158 affects users of Trend Micro Proxy One Pro versions up to and including 5.2.1026.
CVE-2022-33158 is associated with local privilege escalation attacks on affected systems.
To exploit CVE-2022-33158, an attacker must first have the ability to execute low-privileged code on the target system.