First published: Thu Jun 06 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT RealTime Scan service. By creating a junction, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex One |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-22693 has a medium severity level due to its potential to allow local privilege escalation.
To fix ZDI-CAN-22693, ensure that you apply the latest security patches provided by Trend Micro for Apex One.
ZDI-CAN-22693 affects installations of Trend Micro Apex One Security Agent that have not been updated.
ZDI-CAN-22693 is a local privilege escalation vulnerability that requires low-privileged code execution for exploitation.
No, ZDI-CAN-22693 requires local access to the system in order to be exploited.