First published: Tue Oct 22 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro VPN Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DEP Manager. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro VPN Proxy One Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41183 has been assessed as a high-severity vulnerability due to its potential for privilege escalation.
To fix CVE-2024-41183, ensure that you update Trend Micro VPN Proxy One Pro to the latest version that addresses this vulnerability.
Organizations using vulnerable installations of Trend Micro VPN Proxy One Pro are at risk of CVE-2024-41183.
CVE-2024-41183 facilitates local privilege escalation attacks, allowing low-privileged users to gain higher privileges.
No, CVE-2024-41183 requires local access to the system to execute low-privileged code for exploitation.