First published: Tue Jan 23 2024(Updated: )
A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Deep Security | ||
=20.0 | ||
=20.0-update1337 | ||
=20.0-update1559 | ||
=20.0-update158 | ||
=20.0-update167 | ||
=20.0-update1681 | ||
=20.0-update173 | ||
=20.0-update180 | ||
=20.0-update182 | ||
=20.0-update1822 | ||
=20.0-update183 | ||
=20.0-update1876 | ||
=20.0-update190 | ||
=20.0-update198 | ||
=20.0-update2009 | ||
=20.0-update208 | ||
=20.0-update213 | ||
=20.0-update2204 | ||
=20.0-update223 | ||
=20.0-update224 | ||
=20.0-update2419 | ||
=20.0-update2593 | ||
=20.0-update2740 | ||
=20.0-update2921 | ||
=20.0-update3165 | ||
=20.0-update3288 | ||
=20.0-update3445 | ||
=20.0-update3530 | ||
=20.0-update3771 | ||
=20.0-update3964 | ||
=20.0-update4185 | ||
=20.0-update4416 | ||
=20.0-update4726 | ||
=20.0-update4959 | ||
=20.0-update5137 | ||
=20.0-update5394 | ||
=20.0-update5512 | ||
=20.0-update5810 | ||
=20.0-update5995 | ||
=20.0-update6313 | ||
=20.0-update6690 | ||
=20.0-update6860 | ||
=20.0-update7119 | ||
=20.0-update7303 | ||
=20.0-update7476 | ||
=20.0-update7719 | ||
=20.0-update7943 | ||
=20.0-update8137 | ||
=20.0-update8268 | ||
=20.0-update877 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.