First published: Tue Nov 19 2024(Updated: )
A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Deep Security Agent |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51503 has been classified as a high severity vulnerability due to its potential to allow privilege escalation and arbitrary code execution.
To mitigate CVE-2024-51503, it is recommended to update the Trend Micro Deep Security Agent to the latest version where the vulnerability is addressed.
CVE-2024-51503 affects users of Trend Micro Deep Security Agent, particularly those with configurations that allow for manual scan command execution.
Exploitation of CVE-2024-51503 could allow attackers with legitimate access to execute arbitrary commands and escalate their privileges on the affected system.
CVE-2024-51503 is not classified as a zero-day vulnerability, but it may still pose significant risk to systems until a fix is applied.