First published: Tue Jul 30 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro VPN Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the VpnBackgroundController executable. By creating a symbolic link, an attacker can abuse the application to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro VPN Proxy One Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-22716 is considered high due to its ability to allow local privilege escalation.
To fix ZDI-CAN-22716, ensure that you apply the latest security patches provided by Trend Micro for VPN Proxy One Pro.
ZDI-CAN-22716 affects installations of Trend Micro VPN Proxy One Pro that have not been updated with the latest security fixes.
ZDI-CAN-22716 can be exploited by local attackers who already have the ability to execute low-privileged code on the system.
By exploiting ZDI-CAN-22716, an attacker can escalate their privileges and gain unauthorized access to higher-level system functions.