First published: Thu Jun 06 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT Listener service. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex One |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-22039 is considered high due to its ability to allow local privilege escalation.
To fix ZDI-CAN-22039, apply the latest security updates for Trend Micro Apex One as provided by the vendor.
ZDI-CAN-22039 affects installations of Trend Micro Apex One that allow local attackers to escalate privileges.
ZDI-CAN-22039 is classified as a local privilege escalation vulnerability.
An attacker must first have the ability to execute low-privileged code on the target system to exploit ZDI-CAN-22039.