First published: Mon Nov 21 2022(Updated: )
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | <14.0.11789 | |
Trendmicro Apex One | =2019 | |
Trend Micro Apex One | ||
<14.0.11789 | ||
=2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-44651.
The severity of CVE-2022-44651 is high with a CVSS score of 7.8.
The affected software is Trend Micro Apex One and Worry-Free Business Security versions 2019 and 14.0.11789.
A local attacker can exploit CVE-2022-44651 by executing low-privileged code on the target system.
Yes, you can find more information about CVE-2022-44651 at the following references: 1. [Trend Micro Solution Article](https://success.trendmicro.com/solution/000291770) 2. [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-22-1620/)