First published: Tue Jul 30 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro VPN Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the VpnBackgroundController executable. By creating a symbolic link, an attacker can abuse the application to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro VPN Proxy One Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1022 is considered to be high due to its potential for privilege escalation.
To fix ZDI-24-1022, you should apply the latest security patches provided by Trend Micro for VPN Proxy One Pro.
ZDI-24-1022 affects installations of Trend Micro VPN Proxy One Pro that have not been updated.
The impact of ZDI-24-1022 is the ability for local attackers to escalate privileges on affected systems.
An attacker must first have the capability to execute low-privileged code on the target system to exploit ZDI-24-1022.