First published: Mon Oct 10 2022(Updated: )
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | ||
Trendmicro Apex One | =2019 | |
Microsoft Windows | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41744 is a vulnerability that allows local attackers to escalate privileges on affected installations of Trend Micro Apex One.
CVE-2022-41744 works by exploiting a time-of-check time-of-use (TOCTOU) flaw within the Apex One Vulnerability Protection Service.
CVE-2022-41744 has a severity rating of 7.8 (high).
Trend Micro Apex One and Worry-Free Business Security versions 2019 and later are affected by CVE-2022-41744.
To fix CVE-2022-41744, it is recommended to update to the latest version of Trend Micro Apex One or apply the necessary patches provided by Trend Micro.