First published: Thu Dec 22 2022(Updated: )
A link following vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges by creating a symbolic link and abusing the service to delete a file. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Apex One | ||
Trendmicro Apex One | =2019 | |
Microsoft Windows | ||
Trend Micro Apex One | ||
All of | ||
Any of | ||
Trendmicro Apex One | ||
Trendmicro Apex One | =2019 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-45798.
The severity of CVE-2022-45798 is high with a CVSS score of 7.8.
Trend Micro Apex One and Worry-Free Business Security versions 2019 and later are affected.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
No, Microsoft Windows is not vulnerable to CVE-2022-45798.